[Secure-testing-commits] [Git][security-tracker-team/security-tracker][master] remove no-dsa for three gdk-pixbuf issues, fixed along in DSA
Moritz Muehlenhoff
jmm at debian.org
Mon Jan 15 17:50:14 UTC 2018
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
232f85d8 by Moritz Muehlenhoff at 2018-01-15T18:49:39+01:00
remove no-dsa for three gdk-pixbuf issues, fixed along in DSA
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -47277,7 +47277,6 @@ CVE-2017-6317 (Memory leak in the add_shader_program function in vrend_renderer.
NOTE: https://cgit.freedesktop.org/virglrenderer/commit/?id=a2f12a1b0f95b13b6f8dc3d05d7b74b4386394e4 (0.6.0)
CVE-2017-6314 (The make_available_at_least function in io-tiff.c in gdk-pixbuf allows ...)
- gdk-pixbuf <unfixed> (bug #856448)
- [stretch] - gdk-pixbuf <no-dsa> (Minor issue, can be fixed via point release)
[jessie] - gdk-pixbuf <no-dsa> (Minor issue, can be fixed via point release)
[wheezy] - gdk-pixbuf <no-dsa> (Minor issue, can be fixed in next update)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=779020
@@ -47285,7 +47284,6 @@ CVE-2017-6314 (The make_available_at_least function in io-tiff.c in gdk-pixbuf a
NOTE: Fixed by: https://git.gnome.org/browse/gdk-pixbuf/commit/?id=1e513abdb55529f888233d3c96b27352d83aad5f
CVE-2017-6313 (Integer underflow in the load_resources function in io-icns.c in ...)
- gdk-pixbuf <unfixed> (bug #856445)
- [stretch] - gdk-pixbuf <no-dsa> (Minor issue, can be fixed via point release)
[jessie] - gdk-pixbuf <no-dsa> (Minor issue, can be fixed via point release)
[wheezy] - gdk-pixbuf <no-dsa> (Minor issue, can be fixed in next update)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=779016
@@ -47294,7 +47292,6 @@ CVE-2017-6313 (Integer underflow in the load_resources function in io-icns.c in
NOTE: Tests: https://git.gnome.org/browse/gdk-pixbuf/commit/?id=4cc39d479356b6b09e3d62a0f3ab424db6c266d8
CVE-2017-6312 (Integer overflow in io-ico.c in gdk-pixbuf allows context-dependent ...)
- gdk-pixbuf <unfixed> (bug #856444)
- [stretch] - gdk-pixbuf <no-dsa> (Minor issue, can be fixed via point release)
[jessie] - gdk-pixbuf <no-dsa> (Minor issue, can be fixed via point release)
[wheezy] - gdk-pixbuf <no-dsa> (Minor issue, can be fixed in next update)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=779012
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/232f85d8ca52441937f96b9610257474223906b0
---
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/232f85d8ca52441937f96b9610257474223906b0
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.alioth.debian.org/pipermail/secure-testing-commits/attachments/20180115/ac6a4d49/attachment.html>
More information about the Secure-testing-commits
mailing list