diff options
Diffstat (limited to 'zarb-ml/mageia-dev/2012-May/015519.html')
-rw-r--r-- | zarb-ml/mageia-dev/2012-May/015519.html | 104 |
1 files changed, 104 insertions, 0 deletions
diff --git a/zarb-ml/mageia-dev/2012-May/015519.html b/zarb-ml/mageia-dev/2012-May/015519.html new file mode 100644 index 000000000..d6fe79cc6 --- /dev/null +++ b/zarb-ml/mageia-dev/2012-May/015519.html @@ -0,0 +1,104 @@ +<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN"> +<HTML> + <HEAD> + <TITLE> [Mageia-dev] Freeze push: openjpeg 1.5.0 + </TITLE> + <LINK REL="Index" HREF="index.html" > + <LINK REL="made" HREF="mailto:mageia-dev%40mageia.org?Subject=Re%3A%20%5BMageia-dev%5D%20Freeze%20push%3A%20openjpeg%201.5.0&In-Reply-To=%3Cjohopl%24m8h%241%40dough.gmane.org%3E"> + <META NAME="robots" CONTENT="index,nofollow"> + <META http-equiv="Content-Type" content="text/html; charset=us-ascii"> + <LINK REL="Previous" HREF="015517.html"> + <LINK REL="Next" HREF="015521.html"> + </HEAD> + <BODY BGCOLOR="#ffffff"> + <H1>[Mageia-dev] Freeze push: openjpeg 1.5.0</H1> + <B>David Walser</B> + <A HREF="mailto:mageia-dev%40mageia.org?Subject=Re%3A%20%5BMageia-dev%5D%20Freeze%20push%3A%20openjpeg%201.5.0&In-Reply-To=%3Cjohopl%24m8h%241%40dough.gmane.org%3E" + TITLE="[Mageia-dev] Freeze push: openjpeg 1.5.0">luigiwalser at yahoo.com + </A><BR> + <I>Fri May 11 03:08:03 CEST 2012</I> + <P><UL> + <LI>Previous message: <A HREF="015517.html">[Mageia-dev] Freeze push: opera +</A></li> + <LI>Next message: <A HREF="015521.html">[Mageia-dev] Freeze push: blender 2.63a +</A></li> + <LI> <B>Messages sorted by:</B> + <a href="date.html#15519">[ date ]</a> + <a href="thread.html#15519">[ thread ]</a> + <a href="subject.html#15519">[ subject ]</a> + <a href="author.html#15519">[ author ]</a> + </LI> + </UL> + <HR> +<!--beginarticle--> +<PRE>David Walser wrote: +><i> David Walser wrote: +</I>>><i> Funda Wang wrote: +</I>>>><i> Hello, +</I>>>><i> +</I>>>><i> Could somebody push openjpeg 1.5.0 into cauldron? It fixed +</I>>>><i> CVE-2012-1499: The JPEG 2000 codec in OpenJPEG before 1.5 does not +</I>>>><i> properly allocate memory during file parsing, which allows remote +</I>>>><i> attackers to execute arbitrary code via a crafted file. +</I>>>><i> +</I>>>><i> Thanks. +</I>>><i> +</I>>><i> Funda, does a patch exist for this? Mageia 1 should be vulnerable to this. +</I>><i> +</I>><i> Funda, do you know what upstream commit(s) fixes this? +</I> +Just in case anyone was wondering, upstream commits 1330 and 1331 fix this, but only version 1.4 was vulnerable. 1.3 (in Mageia 1) is not. + +</PRE> + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +<!--endarticle--> + <HR> + <P><UL> + <!--threads--> + <LI>Previous message: <A HREF="015517.html">[Mageia-dev] Freeze push: opera +</A></li> + <LI>Next message: <A HREF="015521.html">[Mageia-dev] Freeze push: blender 2.63a +</A></li> + <LI> <B>Messages sorted by:</B> + <a href="date.html#15519">[ date ]</a> + <a href="thread.html#15519">[ thread ]</a> + <a href="subject.html#15519">[ subject ]</a> + <a href="author.html#15519">[ author ]</a> + </LI> + </UL> + +<hr> +<a href="https://www.mageia.org/mailman/listinfo/mageia-dev">More information about the Mageia-dev +mailing list</a><br> +</body></html> |