diff options
Diffstat (limited to 'zarb-ml/mageia-dev/2012-April/014269.html')
| -rw-r--r-- | zarb-ml/mageia-dev/2012-April/014269.html | 88 | 
1 files changed, 88 insertions, 0 deletions
diff --git a/zarb-ml/mageia-dev/2012-April/014269.html b/zarb-ml/mageia-dev/2012-April/014269.html new file mode 100644 index 000000000..739a242ca --- /dev/null +++ b/zarb-ml/mageia-dev/2012-April/014269.html @@ -0,0 +1,88 @@ +<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN"> +<HTML> + <HEAD> +   <TITLE> [Mageia-dev] Freeze push: openjpeg 1.5.0 +   </TITLE> +   <LINK REL="Index" HREF="index.html" > +   <LINK REL="made" HREF="mailto:mageia-dev%40mageia.org?Subject=Re%3A%20%5BMageia-dev%5D%20Freeze%20push%3A%20openjpeg%201.5.0&In-Reply-To=%3Cjmcgin%24hhh%243%40dough.gmane.org%3E"> +   <META NAME="robots" CONTENT="index,nofollow"> +   <META http-equiv="Content-Type" content="text/html; charset=us-ascii"> +   <LINK REL="Previous"  HREF="014236.html"> +   <LINK REL="Next"  HREF="014622.html"> + </HEAD> + <BODY BGCOLOR="#ffffff"> +   <H1>[Mageia-dev] Freeze push: openjpeg 1.5.0</H1> +    <B>David Walser</B>  +    <A HREF="mailto:mageia-dev%40mageia.org?Subject=Re%3A%20%5BMageia-dev%5D%20Freeze%20push%3A%20openjpeg%201.5.0&In-Reply-To=%3Cjmcgin%24hhh%243%40dough.gmane.org%3E" +       TITLE="[Mageia-dev] Freeze push: openjpeg 1.5.0">luigiwalser at yahoo.com +       </A><BR> +    <I>Sat Apr 14 20:44:39 CEST 2012</I> +    <P><UL> +        <LI>Previous message: <A HREF="014236.html">[Mageia-dev] Freeze push: openjpeg 1.5.0 +</A></li> +        <LI>Next message: <A HREF="014622.html">[Mageia-dev] Freeze push: openjpeg 1.5.0 +</A></li> +         <LI> <B>Messages sorted by:</B>  +              <a href="date.html#14269">[ date ]</a> +              <a href="thread.html#14269">[ thread ]</a> +              <a href="subject.html#14269">[ subject ]</a> +              <a href="author.html#14269">[ author ]</a> +         </LI> +       </UL> +    <HR>   +<!--beginarticle--> +<PRE>Funda Wang wrote: +><i> Hello, +</I>><i>  +</I>><i> Could somebody push openjpeg 1.5.0 into cauldron? It fixed +</I>><i> CVE-2012-1499: The JPEG 2000 codec in OpenJPEG before 1.5 does not +</I>><i> properly allocate memory during file parsing, which allows remote +</I>><i> attackers to execute arbitrary code via a crafted file. +</I>><i>  +</I>><i> Thanks. +</I> +Funda, does a patch exist for this?  Mageia 1 should be vulnerable to this. + +</PRE> + + + + + + + + + + + + + + + + + + + + + + +<!--endarticle--> +    <HR> +    <P><UL> +        <!--threads--> +	<LI>Previous message: <A HREF="014236.html">[Mageia-dev] Freeze push: openjpeg 1.5.0 +</A></li> +	<LI>Next message: <A HREF="014622.html">[Mageia-dev] Freeze push: openjpeg 1.5.0 +</A></li> +         <LI> <B>Messages sorted by:</B>  +              <a href="date.html#14269">[ date ]</a> +              <a href="thread.html#14269">[ thread ]</a> +              <a href="subject.html#14269">[ subject ]</a> +              <a href="author.html#14269">[ author ]</a> +         </LI> +       </UL> + +<hr> +<a href="https://www.mageia.org/mailman/listinfo/mageia-dev">More information about the Mageia-dev +mailing list</a><br> +</body></html>  | 
