Bug#631524: CVE-2011-2485: excessive memory use due improper checking of certain return values in GIF image loader

Josselin Mouette joss at debian.org
Tue Jun 28 23:50:58 UTC 2011


Le vendredi 24 juin 2011 à 12:53 -0300, Luciano Bello a écrit : 
> Package: gdk-pixbuf
> Severity: important
> Tags: security patch
> 
> Hi,
>    	The Red Hat Security Response  Team reported[1] a bug in gdk-pixbuf.
> Patch is provided too[2].
> 	The CVE (Common Vulnerabilities & Exposures) assigned is CVE-2011-2485.
> If you fix the vulnerability please also make sure to include the CVE id in your 
> changelog entry.

The gtk+2.0 package in lenny and squeeze is affected as well.

Could you please update the security tracker?
(As for the bug, I’m not sure whether it should be cloned or reopened.)

-- 
 .''`.      Josselin Mouette
: :' :
`. `'
  `-
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 190 bytes
Desc: This is a digitally signed message part
URL: <http://lists.alioth.debian.org/pipermail/pkg-gnome-maintainers/attachments/20110629/78279946/attachment.pgp>


More information about the pkg-gnome-maintainers mailing list