[Secure-testing-commits] [Git][security-tracker-team/security-tracker][master] 2 commits: Use HTTPs for hg.libsdl.org links

Felix Geyer fgeyer at debian.org
Mon Mar 5 19:49:38 UTC 2018


Felix Geyer pushed to branch master at Debian Security Tracker / security-tracker


Commits:
864f3e89 by Felix Geyer at 2018-03-05T20:45:45+01:00
Use HTTPs for hg.libsdl.org links

- - - - -
d073abab by Felix Geyer at 2018-03-05T20:45:46+01:00
Record fixed sdl-image1.2 version for SDL_image issues

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -28885,21 +28885,21 @@ CVE-2017-14451
 CVE-2017-14450 [Simple DirectMedia Layer SDL2_Image LWZ Decompression Buffer Overflow Vulnerability]
 	RESERVED
 	- libsdl2-image 2.0.3+dfsg1-1
+	- sdl-image1.2 1.2.12-8
 	NOTE: https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0499
-	NOTE: http://hg.libsdl.org/SDL_image/rev/45e750f92c84
-	TODO: check sdl-image1.2
+	NOTE: https://hg.libsdl.org/SDL_image/rev/45e750f92c84
 CVE-2017-14449 [Simple DirectMedia Layer SDL2_image do_layer_surface Double-Free Vulnerability]
 	RESERVED
 	- libsdl2-image 2.0.3+dfsg1-1
+	- sdl-image1.2 <not-affected> (Vulnerable code not present)
 	NOTE: https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0498
-	NOTE: http://hg.libsdl.org/SDL_image/rev/d0142861559c
-	TODO: check sdl-image1.2
+	NOTE: https://hg.libsdl.org/SDL_image/rev/d0142861559c
 CVE-2017-14448 [Simple DirectMedia Layer SDL2_image load_xcf_tile_rle Decompression Code Execution Vulnerability]
 	RESERVED
 	- libsdl2-image 2.0.3+dfsg1-1
+	- sdl-image1.2 1.2.12-8
 	NOTE: https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0497
-	NOTE: http://hg.libsdl.org/SDL_image/rev/7df1580f1695
-	TODO: check sdl-image1.2
+	NOTE: https://hg.libsdl.org/SDL_image/rev/7df1580f1695
 CVE-2017-14447
 	RESERVED
 CVE-2017-14446
@@ -28913,21 +28913,21 @@ CVE-2017-14443
 CVE-2017-14442 [Simple DirectMedia Layer SDL2_image Image Palette Population Code Execution Vulnerability]
 	RESERVED
 	- libsdl2-image 2.0.3+dfsg1-1
+	- sdl-image1.2 1.2.12-8
 	NOTE: https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0491
-	NOTE: http://hg.libsdl.org/SDL_image/rev/37445f6180a8
-	TODO: check sdl-image1.2
+	NOTE: https://hg.libsdl.org/SDL_image/rev/37445f6180a8
 CVE-2017-14441 [Simple DirectMedia Layer SDL2_image ICO Pitch Handling Code Execution Vulnerability]
 	RESERVED
 	- libsdl2-image 2.0.3+dfsg1-1
+	- sdl-image1.2 1.2.12-8
 	NOTE: https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0490
-	NOTE: http://hg.libsdl.org/SDL_image/rev/a1e9b624ca10
-	TODO: check sdl-image1.2
+	NOTE: https://hg.libsdl.org/SDL_image/rev/a1e9b624ca10
 CVE-2017-14440 [Simple DirectMedia Layer SDL2_image ILBM CMAP Parsing Code Execution Vulnerability]
 	RESERVED
 	- libsdl2-image 2.0.3+dfsg1-1
+	- sdl-image1.2 1.2.12-8
 	NOTE: https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0489
-	NOTE: http://hg.libsdl.org/SDL_image/rev/bfa08dc02b3c
-	TODO: check sdl-image1.2
+	NOTE: https://hg.libsdl.org/SDL_image/rev/bfa08dc02b3c
 CVE-2017-14439
 	RESERVED
 CVE-2017-14438
@@ -35874,10 +35874,10 @@ CVE-2017-12123
 CVE-2017-12122 [Simple DirectMedia Layer SDL2_Image IMG_LoadLBM_RW Code Execution Vulnerability]
 	RESERVED
 	- libsdl2-image 2.0.3+dfsg1-1
+	- sdl-image1.2 1.2.12-8
 	NOTE: https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0488
-	NOTE: http://hg.libsdl.org/SDL_image/rev/16772bbb1b09
-	NOTE: http://hg.libsdl.org/SDL_image/rev/97f7f01e0665
-	TODO: check sdl-image1.2
+	NOTE: https://hg.libsdl.org/SDL_image/rev/16772bbb1b09
+	NOTE: https://hg.libsdl.org/SDL_image/rev/97f7f01e0665
 CVE-2017-12121
 	RESERVED
 CVE-2017-12120



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/compare/3e315bc54b0eab657f32b97b55e6c5c10adf807e...d073abab34fc4f078d336260da03b45a99de4731

---
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/compare/3e315bc54b0eab657f32b97b55e6c5c10adf807e...d073abab34fc4f078d336260da03b45a99de4731
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.alioth.debian.org/pipermail/secure-testing-commits/attachments/20180305/b6f6c22a/attachment.html>


More information about the Secure-testing-commits mailing list