blob: d6fe79cc641c60afa53e8d9bb16bc3336742e440 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
|
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<TITLE> [Mageia-dev] Freeze push: openjpeg 1.5.0
</TITLE>
<LINK REL="Index" HREF="index.html" >
<LINK REL="made" HREF="mailto:mageia-dev%40mageia.org?Subject=Re%3A%20%5BMageia-dev%5D%20Freeze%20push%3A%20openjpeg%201.5.0&In-Reply-To=%3Cjohopl%24m8h%241%40dough.gmane.org%3E">
<META NAME="robots" CONTENT="index,nofollow">
<META http-equiv="Content-Type" content="text/html; charset=us-ascii">
<LINK REL="Previous" HREF="015517.html">
<LINK REL="Next" HREF="015521.html">
</HEAD>
<BODY BGCOLOR="#ffffff">
<H1>[Mageia-dev] Freeze push: openjpeg 1.5.0</H1>
<B>David Walser</B>
<A HREF="mailto:mageia-dev%40mageia.org?Subject=Re%3A%20%5BMageia-dev%5D%20Freeze%20push%3A%20openjpeg%201.5.0&In-Reply-To=%3Cjohopl%24m8h%241%40dough.gmane.org%3E"
TITLE="[Mageia-dev] Freeze push: openjpeg 1.5.0">luigiwalser at yahoo.com
</A><BR>
<I>Fri May 11 03:08:03 CEST 2012</I>
<P><UL>
<LI>Previous message: <A HREF="015517.html">[Mageia-dev] Freeze push: opera
</A></li>
<LI>Next message: <A HREF="015521.html">[Mageia-dev] Freeze push: blender 2.63a
</A></li>
<LI> <B>Messages sorted by:</B>
<a href="date.html#15519">[ date ]</a>
<a href="thread.html#15519">[ thread ]</a>
<a href="subject.html#15519">[ subject ]</a>
<a href="author.html#15519">[ author ]</a>
</LI>
</UL>
<HR>
<!--beginarticle-->
<PRE>David Walser wrote:
><i> David Walser wrote:
</I>>><i> Funda Wang wrote:
</I>>>><i> Hello,
</I>>>><i>
</I>>>><i> Could somebody push openjpeg 1.5.0 into cauldron? It fixed
</I>>>><i> CVE-2012-1499: The JPEG 2000 codec in OpenJPEG before 1.5 does not
</I>>>><i> properly allocate memory during file parsing, which allows remote
</I>>>><i> attackers to execute arbitrary code via a crafted file.
</I>>>><i>
</I>>>><i> Thanks.
</I>>><i>
</I>>><i> Funda, does a patch exist for this? Mageia 1 should be vulnerable to this.
</I>><i>
</I>><i> Funda, do you know what upstream commit(s) fixes this?
</I>
Just in case anyone was wondering, upstream commits 1330 and 1331 fix this, but only version 1.4 was vulnerable. 1.3 (in Mageia 1) is not.
</PRE>
<!--endarticle-->
<HR>
<P><UL>
<!--threads-->
<LI>Previous message: <A HREF="015517.html">[Mageia-dev] Freeze push: opera
</A></li>
<LI>Next message: <A HREF="015521.html">[Mageia-dev] Freeze push: blender 2.63a
</A></li>
<LI> <B>Messages sorted by:</B>
<a href="date.html#15519">[ date ]</a>
<a href="thread.html#15519">[ thread ]</a>
<a href="subject.html#15519">[ subject ]</a>
<a href="author.html#15519">[ author ]</a>
</LI>
</UL>
<hr>
<a href="https://www.mageia.org/mailman/listinfo/mageia-dev">More information about the Mageia-dev
mailing list</a><br>
</body></html>
|