summaryrefslogtreecommitdiffstats
path: root/data/CVE/list.2017
diff options
context:
space:
mode:
authorAdrian Bunk <bunk@debian.org>2021-12-27 07:24:08 +0200
committerAdrian Bunk <bunk@debian.org>2021-12-27 07:24:08 +0200
commitf2f34c0fc5b3f41532456635c679264fcadb174d (patch)
treeb6b88055cd0286825b08e3859ed50215b8fb3f6e /data/CVE/list.2017
parent0c000b87a3adabe1915bd51b95ff4e062e9a1737 (diff)
CVE-2017-2870 and CVE-2017-6311 in gdk-pixbuf are not affecting stretch
Diffstat (limited to 'data/CVE/list.2017')
-rw-r--r--data/CVE/list.20172
1 files changed, 2 insertions, 0 deletions
diff --git a/data/CVE/list.2017 b/data/CVE/list.2017
index 6850963d73..d2aa379a48 100644
--- a/data/CVE/list.2017
+++ b/data/CVE/list.2017
@@ -36578,6 +36578,7 @@ CVE-2017-6312 (Integer overflow in io-ico.c in gdk-pixbuf allows context-depende
NOTE: Tests: https://git.gnome.org/browse/gdk-pixbuf/commit/?id=a6303ad765882555cf1b278a09be5f9e4cf3a39d
CVE-2017-6311 (gdk-pixbuf-thumbnailer.c in gdk-pixbuf allows context-dependent attack ...)
- gdk-pixbuf 2.36.10-1 (bug #858491; unimportant)
+ [stretch] - gdk-pixbuf <not-affected> (thumbnailer not installed before 2.36.5-3)
[jessie] - gdk-pixbuf <not-affected> (Code introduced in 2.36.1)
[wheezy] - gdk-pixbuf <not-affected> (Code introduced in 2.36.1)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=778204
@@ -45572,6 +45573,7 @@ CVE-2017-2871 (Insufficient security checks exist in the recovery procedure used
CVE-2017-2870 (An exploitable integer overflow vulnerability exists in the tiff_image ...)
{DLA-2043-1}
- gdk-pixbuf 2.36.10-1 (unimportant; bug #873787)
+ [stretch] - gdk-pixbuf <not-affected> (Built with GCC in Debian)
NOTE: https://git.gnome.org/browse/gdk-pixbuf/commit/?id=31a6cff3dfc6944aad4612a9668b8ad39122e48b
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=770986
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=780269

© 2014-2024 Faster IT GmbH | imprint | privacy policy