diff options
author | Adrian Bunk <bunk@debian.org> | 2021-12-27 07:24:08 +0200 |
---|---|---|
committer | Adrian Bunk <bunk@debian.org> | 2021-12-27 07:24:08 +0200 |
commit | f2f34c0fc5b3f41532456635c679264fcadb174d (patch) | |
tree | b6b88055cd0286825b08e3859ed50215b8fb3f6e /data/CVE/list.2017 | |
parent | 0c000b87a3adabe1915bd51b95ff4e062e9a1737 (diff) |
CVE-2017-2870 and CVE-2017-6311 in gdk-pixbuf are not affecting stretch
Diffstat (limited to 'data/CVE/list.2017')
-rw-r--r-- | data/CVE/list.2017 | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/data/CVE/list.2017 b/data/CVE/list.2017 index 6850963d73..d2aa379a48 100644 --- a/data/CVE/list.2017 +++ b/data/CVE/list.2017 @@ -36578,6 +36578,7 @@ CVE-2017-6312 (Integer overflow in io-ico.c in gdk-pixbuf allows context-depende NOTE: Tests: https://git.gnome.org/browse/gdk-pixbuf/commit/?id=a6303ad765882555cf1b278a09be5f9e4cf3a39d CVE-2017-6311 (gdk-pixbuf-thumbnailer.c in gdk-pixbuf allows context-dependent attack ...) - gdk-pixbuf 2.36.10-1 (bug #858491; unimportant) + [stretch] - gdk-pixbuf <not-affected> (thumbnailer not installed before 2.36.5-3) [jessie] - gdk-pixbuf <not-affected> (Code introduced in 2.36.1) [wheezy] - gdk-pixbuf <not-affected> (Code introduced in 2.36.1) NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=778204 @@ -45572,6 +45573,7 @@ CVE-2017-2871 (Insufficient security checks exist in the recovery procedure used CVE-2017-2870 (An exploitable integer overflow vulnerability exists in the tiff_image ...) {DLA-2043-1} - gdk-pixbuf 2.36.10-1 (unimportant; bug #873787) + [stretch] - gdk-pixbuf <not-affected> (Built with GCC in Debian) NOTE: https://git.gnome.org/browse/gdk-pixbuf/commit/?id=31a6cff3dfc6944aad4612a9668b8ad39122e48b NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=770986 NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=780269 |