This bug was fixed in the package gtk+2.0 - 2.24.28-1ubuntu1.1
--------------- gtk+2.0 (2.24.28-1ubuntu1.1) wily-security; urgency=medium
* gdkcairo-Avoid-integer-overflow.patch: new patch. Cherry-pick upstream commit from GTK+3 to avoid integer overflow when allocating a large block of memory in gdk_cairo_set_source_pixbuf. (LP: #1540811) - CVE-2013-7447
-- Vlad Orlov <email address hidden> Tue, 22 Sep 2015 13:27:04 +0300
This bug was fixed in the package gtk+2.0 - 2.24.28-1ubuntu1.1
--------------- 1ubuntu1. 1) wily-security; urgency=medium
gtk+2.0 (2.24.28-
* gdkcairo- Avoid-integer- overflow. patch: new patch. Cherry-pick upstream set_source_ pixbuf. (LP: #1540811)
commit from GTK+3 to avoid integer overflow when allocating a large block
of memory in gdk_cairo_
- CVE-2013-7447
-- Vlad Orlov <email address hidden> Tue, 22 Sep 2015 13:27:04 +0300