[Bug 609162] New: CVE-2010-2249 libpng: Memory leak when processing Physical Scale (sCAL) images [fedora-all]

bugzilla at redhat.com bugzilla at redhat.com
Tue Jun 29 14:45:18 UTC 2010


Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.

Summary: CVE-2010-2249 libpng: Memory leak when processing Physical Scale (sCAL) images [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=609162

           Summary: CVE-2010-2249 libpng: Memory leak when processing
                    Physical Scale (sCAL) images [fedora-all]
           Product: Fedora
           Version: 13
          Platform: All
        OS/Version: Linux
            Status: NEW
          Keywords: Security, SecurityTracking
          Severity: low
          Priority: low
         Component: mingw32-libpng
        AssignedTo: rjones at redhat.com
        ReportedBy: jlieskov at redhat.com
         QAContact: extras-qa at fedoraproject.org
                CC: lfarkas at lfarkas.org, rjones at redhat.com,
                    erik-fedora at vanpienbroek.nl,
                    fedora-mingw at lists.fedoraproject.org
            Blocks: 608644
    Classification: Fedora
    Target Release: ---



This is an automatically created tracking bug!  It was created to ensure
that one or more security vulnerabilities are fixed in affected Fedora
versions.

For comments that are specific to the vulnerability please use bugs filed
against "Security Response" product referenced in the "Blocks" field.

Forr more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs

When creating a Bodhi update request, please include the bug IDs of the
respective parent bugs filed against the "Security Response" product.
Please mention CVE ids in the RPM changelog when available.

Bodhi update submission link:
https://admin.fedoraproject.org/updates/new/?type_=security&bugs=608644

Please note: this issue affects multiple supported versions of Fedora.
Only one tracking bug has been filed; please only close it when all
affected versions are fixed.


[bug automatically created by: add-tracking-bugs]

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.


More information about the mingw mailing list