[Secure-testing-commits] [Git][security-tracker-team/security-tracker][master] remove no-dsa for three gdk-pixbuf issues, fixed along in DSA

Moritz Muehlenhoff jmm at debian.org
Mon Jan 15 17:50:14 UTC 2018


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
232f85d8 by Moritz Muehlenhoff at 2018-01-15T18:49:39+01:00
remove no-dsa for three gdk-pixbuf issues, fixed along in DSA

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -47277,7 +47277,6 @@ CVE-2017-6317 (Memory leak in the add_shader_program function in vrend_renderer.
 	NOTE: https://cgit.freedesktop.org/virglrenderer/commit/?id=a2f12a1b0f95b13b6f8dc3d05d7b74b4386394e4 (0.6.0)
 CVE-2017-6314 (The make_available_at_least function in io-tiff.c in gdk-pixbuf allows ...)
 	- gdk-pixbuf <unfixed> (bug #856448)
-	[stretch] - gdk-pixbuf <no-dsa> (Minor issue, can be fixed via point release)
 	[jessie] - gdk-pixbuf <no-dsa> (Minor issue, can be fixed via point release)
 	[wheezy] - gdk-pixbuf <no-dsa> (Minor issue, can be fixed in next update)
 	NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=779020
@@ -47285,7 +47284,6 @@ CVE-2017-6314 (The make_available_at_least function in io-tiff.c in gdk-pixbuf a
 	NOTE: Fixed by: https://git.gnome.org/browse/gdk-pixbuf/commit/?id=1e513abdb55529f888233d3c96b27352d83aad5f
 CVE-2017-6313 (Integer underflow in the load_resources function in io-icns.c in ...)
 	- gdk-pixbuf <unfixed> (bug #856445)
-	[stretch] - gdk-pixbuf <no-dsa> (Minor issue, can be fixed via point release)
 	[jessie] - gdk-pixbuf <no-dsa> (Minor issue, can be fixed via point release)
 	[wheezy] - gdk-pixbuf <no-dsa> (Minor issue, can be fixed in next update)
 	NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=779016
@@ -47294,7 +47292,6 @@ CVE-2017-6313 (Integer underflow in the load_resources function in io-icns.c in 
 	NOTE: Tests: https://git.gnome.org/browse/gdk-pixbuf/commit/?id=4cc39d479356b6b09e3d62a0f3ab424db6c266d8
 CVE-2017-6312 (Integer overflow in io-ico.c in gdk-pixbuf allows context-dependent ...)
 	- gdk-pixbuf <unfixed> (bug #856444)
-	[stretch] - gdk-pixbuf <no-dsa> (Minor issue, can be fixed via point release)
 	[jessie] - gdk-pixbuf <no-dsa> (Minor issue, can be fixed via point release)
 	[wheezy] - gdk-pixbuf <no-dsa> (Minor issue, can be fixed in next update)
 	NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=779012



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/232f85d8ca52441937f96b9610257474223906b0

---
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/232f85d8ca52441937f96b9610257474223906b0
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.alioth.debian.org/pipermail/secure-testing-commits/attachments/20180115/ac6a4d49/attachment.html>


More information about the Secure-testing-commits mailing list