Processed: retitle 799275 to [GDK] patch - avoid integer overflow when allocating a large block of memory (CVE-2013-7447) ...
Debian Bug Tracking System
owner at bugs.debian.org
Thu Feb 11 15:09:05 UTC 2016
Processing commands for control at bugs.debian.org:
> retitle 799275 [GDK] patch - avoid integer overflow when allocating a large block of memory (CVE-2013-7447)
Bug #799275 [src:gtk+2.0] [GDK] patch - avoid integer overflow when allocating a large block of memory
Changed Bug title to '[GDK] patch - avoid integer overflow when allocating a large block of memory (CVE-2013-7447)' from '[GDK] patch - avoid integer overflow when allocating a large block of memory'
> tags 799275 + upstream fixed-upstream security
Bug #799275 [src:gtk+2.0] [GDK] patch - avoid integer overflow when allocating a large block of memory (CVE-2013-7447)
Added tag(s) upstream, security, and fixed-upstream.
> tags 799275 + stretch sid
Bug #799275 [src:gtk+2.0] [GDK] patch - avoid integer overflow when allocating a large block of memory (CVE-2013-7447)
Added tag(s) stretch and sid.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
799275: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799275
Debian Bug Tracking System
Contact owner at bugs.debian.org with problems
More information about the pkg-gnome-maintainers
mailing list