Bug#631524: CVE-2011-2485: excessive memory use due improper checking of certain return values in GIF image loader
Josselin Mouette
joss at debian.org
Tue Jun 28 23:50:58 UTC 2011
Le vendredi 24 juin 2011 à 12:53 -0300, Luciano Bello a écrit :
> Package: gdk-pixbuf
> Severity: important
> Tags: security patch
>
> Hi,
> The Red Hat Security Response Team reported[1] a bug in gdk-pixbuf.
> Patch is provided too[2].
> The CVE (Common Vulnerabilities & Exposures) assigned is CVE-2011-2485.
> If you fix the vulnerability please also make sure to include the CVE id in your
> changelog entry.
The gtk+2.0 package in lenny and squeeze is affected as well.
Could you please update the security tracker?
(As for the bug, I’m not sure whether it should be cloned or reopened.)
--
.''`. Josselin Mouette
: :' :
`. `'
`-
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 190 bytes
Desc: This is a digitally signed message part
URL: <http://lists.alioth.debian.org/pipermail/pkg-gnome-maintainers/attachments/20110629/78279946/attachment.pgp>
More information about the pkg-gnome-maintainers
mailing list