On ven., 2012-07-06 at 07:22 -0500, mancha@mac.hush.com wrote: > Re: http://security-tracker.debian.org/tracker/CVE-2012-2763 > > Working with upstream, I cherry-picked the code in gimp 2.8 which > fixes this buffer overflow vulnerability in the script-fu server. > > The attached patch fixes the issue in gimp 2.6.x. > Hi, thank you for your work. Can you prepare a package for Squeeze and provide the debdiff? Regards, -- Yves-Alexis
Attachment:
signature.asc
Description: This is a digitally signed message part