Author: santiago
Date: 2016-02-22 14:03:33 +0000 (Mon, 22 Feb 2016)
New Revision: 39808

Modified:
   data/CVE/list
Log:
CVE-2015-4491, CVE-2015-7673, CVE-2015-7674: gdk-pixbuf code was part of 
gtk+2.0 in squeeze

Modified: data/CVE/list
===================================================================
--- data/CVE/list       2016-02-22 13:50:15 UTC (rev 39807)
+++ data/CVE/list       2016-02-22 14:03:33 UTC (rev 39808)
@@ -10148,6 +10148,7 @@
 CVE-2015-7673 (io-tga.c in gdk-pixbuf before 2.32.0 uses heap memory after its 
...)
        {DSA-3378-1}
        - gdk-pixbuf 2.32.0-1
+       [squeeze] - gtk+2.0 <unfixed>
        NOTE: http://www.openwall.com/lists/oss-security/2015/10/01/3
        NOTE: 
https://git.gnome.org/browse/gdk-pixbuf/commit/?id=19f9685dbff7d1f929c61cf99188df917a18811d
        NOTE: 
https://git.gnome.org/browse/gdk-pixbuf/commit/?id=edf6fb8d856574bc3bb3a703037f56533229267c
@@ -10155,6 +10156,7 @@
 CVE-2015-7674 (Integer overflow in the pixops_scale_nearest function in ...)
        {DSA-3378-1}
        - gdk-pixbuf 2.32.1-1
+       [squeeze] - gtk+2.0 <unfixed>
        NOTE: http://www.openwall.com/lists/oss-security/2015/10/01/4
        NOTE: 
https://git.gnome.org/browse/gdk-pixbuf/commit/?id=e9a5704edaa9aee9498f1fbf6e1b70fcce2e55aa
 CVE-2015-XXXX [trivial hash complexity DoS attack]
@@ -18793,6 +18795,7 @@
 CVE-2015-4491 (Integer overflow in the make_filter_table function in 
pixops/pixops.c ...)
        {DSA-3337-2 DSA-3337-1}
        - gdk-pixbuf 2.31.7-1
+       [squeeze] - gtk+2.0 <unfixed>
        NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=752297
        NOTE: 
https://git.gnome.org/browse/gdk-pixbuf/commit/?id=ffec86ed5010c5a2be14f47b33bcf4ed3169a199
        NOTE: 
https://git.gnome.org/browse/gdk-pixbuf/commit/?id=8dba67cb4f38d62a47757741ad41e3f245b4a32a


_______________________________________________
Secure-testing-commits mailing list
Secure-testing-commits@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits

Reply via email to