Author: carnil Date: 2016-05-16 07:50:02 +0000 (Mon, 16 May 2016) New Revision: 41759
Modified: data/CVE/list Log: Split one gdk-pixbuf entry Modified: data/CVE/list =================================================================== --- data/CVE/list 2016-05-16 07:32:51 UTC (rev 41758) +++ data/CVE/list 2016-05-16 07:50:02 UTC (rev 41759) @@ -17348,14 +17348,19 @@ NOTE: https://git.gnome.org/browse/gdk-pixbuf/commit/?id=edf6fb8d856574bc3bb3a703037f56533229267c NOTE: https://git.gnome.org/browse/gdk-pixbuf/commit/?id=6ddca835100107e6b5841ce9d56074f6d98c387e NOTE: gtk+2.0 2.21.5-1 removed the embedded copy of gdk-pixbuf and build-depends on external gdk-pixbuf +CVE-2015-XXXX [Integer overlows in pixops_* functions] + - gdk-pixbuf 2.34.0-1 + [wheezy] - gdk-pixbuf 2.26.1-1+deb7u4 + NOTE: Fixed by: https://git.gnome.org/browse/gdk-pixbuf/commit/?id=dbfe8f70471864818bf458a39c8a99640895bd22 (2.33.1) + NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/05/12/3 CVE-2015-7674 (Integer overflow in the pixops_scale_nearest function in ...) {DSA-3378-1 DLA-450-1 DLA-434-1} - gdk-pixbuf 2.32.1-1 - - gtk+2.0 2.21.5-1 NOTE: http://www.openwall.com/lists/oss-security/2015/10/01/4 - NOTE: Fix for CVE-2015-7674: https://git.gnome.org/browse/gdk-pixbuf/commit/?id=e9a5704edaa9aee9498f1fbf6e1b70fcce2e55aa - NOTE: Additional hardening against further overflows (but not part of the CVE assignment): https://git.gnome.org/browse/gdk-pixbuf/commit/?id=dbfe8f70471864818bf458a39c8a99640895bd22 + NOTE: Fix for CVE-2015-7674: https://git.gnome.org/browse/gdk-pixbuf/commit/?id=e9a5704edaa9aee9498f1fbf6e1b70fcce2e55aa (2.32.1) + NOTE: Additional hardening against further overflows (but not part of the CVE assignment): https://git.gnome.org/browse/gdk-pixbuf/commit/?id=dbfe8f70471864818bf458a39c8a99640895bd22 (2.33.1) NOTE: The CVE is only assigned for the overflow in the pixops_scale_nearest function. + - gtk+2.0 2.21.5-1 NOTE: gtk+2.0 2.21.5-1 removed the embedded copy of gdk-pixbuf and build-depends on external gdk-pixbuf CVE-2015-XXXX [trivial hash complexity DoS attack] - php5 <unfixed> (bug #800564) _______________________________________________ Secure-testing-commits mailing list Secure-testing-commits@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits