All of lore.kernel.org
 help / color / mirror / Atom feed
* [Buildroot] [PATCH] sdl2: security bump to version 2.0.7
@ 2017-10-26 12:18 Peter Korsgaard
  2017-10-27 11:49 ` Peter Korsgaard
                   ` (2 more replies)
  0 siblings, 3 replies; 4+ messages in thread
From: Peter Korsgaard @ 2017-10-26 12:18 UTC (permalink / raw)
  To: buildroot

Fixes CVE-2017-2888 - An exploitable integer overflow vulnerability exists
when creating a new RGB Surface in SDL 2.0.5.  A specially crafted file can
cause an integer overflow resulting in too little memory being allocated
which can lead to a buffer overflow and potential code execution.  An
attacker can provide a specially crafted image file to trigger this
vulnerability.

Also add a hash for the license file while we're at it.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
---
 package/sdl2/sdl2.hash | 6 ++++--
 package/sdl2/sdl2.mk   | 2 +-
 2 files changed, 5 insertions(+), 3 deletions(-)

diff --git a/package/sdl2/sdl2.hash b/package/sdl2/sdl2.hash
index c0a8bfc77c..588f8f49ef 100644
--- a/package/sdl2/sdl2.hash
+++ b/package/sdl2/sdl2.hash
@@ -1,2 +1,4 @@
-# Locally calculated after checking http://www.libsdl.org/release/SDL2-2.0.6.tar.gz.sig
-sha256 03658b5660d16d7b31263a691e058ed37acdab155d68dabbad79998fb552c5df  SDL2-2.0.6.tar.gz
+# Locally calculated after checking http://www.libsdl.org/release/SDL2-2.0.7.tar.gz.sig
+sha256 ee35c74c4313e2eda104b14b1b86f7db84a04eeab9430d56e001cea268bf4d5e  SDL2-2.0.7.tar.gz
+# Locally calculated
+sha256 bbd2edb1789c33de29bb9f8d1dbe2774584a9ce8c4e3162944b7a3a447f5e85d  COPYING.txt
diff --git a/package/sdl2/sdl2.mk b/package/sdl2/sdl2.mk
index fa3b57e6cd..3e3ba54aaf 100644
--- a/package/sdl2/sdl2.mk
+++ b/package/sdl2/sdl2.mk
@@ -4,7 +4,7 @@
 #
 ################################################################################
 
-SDL2_VERSION = 2.0.6
+SDL2_VERSION = 2.0.7
 SDL2_SOURCE = SDL2-$(SDL2_VERSION).tar.gz
 SDL2_SITE = http://www.libsdl.org/release
 SDL2_LICENSE = Zlib
-- 
2.11.0

^ permalink raw reply related	[flat|nested] 4+ messages in thread

* [Buildroot] [PATCH] sdl2: security bump to version 2.0.7
  2017-10-26 12:18 [Buildroot] [PATCH] sdl2: security bump to version 2.0.7 Peter Korsgaard
@ 2017-10-27 11:49 ` Peter Korsgaard
  2017-10-28 17:15 ` Peter Korsgaard
  2017-11-15 18:52 ` Peter Korsgaard
  2 siblings, 0 replies; 4+ messages in thread
From: Peter Korsgaard @ 2017-10-27 11:49 UTC (permalink / raw)
  To: buildroot

>>>>> "Peter" == Peter Korsgaard <peter@korsgaard.com> writes:

 > Fixes CVE-2017-2888 - An exploitable integer overflow vulnerability exists
 > when creating a new RGB Surface in SDL 2.0.5.  A specially crafted file can
 > cause an integer overflow resulting in too little memory being allocated
 > which can lead to a buffer overflow and potential code execution.  An
 > attacker can provide a specially crafted image file to trigger this
 > vulnerability.

 > Also add a hash for the license file while we're at it.

 > Signed-off-by: Peter Korsgaard <peter@korsgaard.com>

Committed, thanks.

-- 
Bye, Peter Korsgaard

^ permalink raw reply	[flat|nested] 4+ messages in thread

* [Buildroot] [PATCH] sdl2: security bump to version 2.0.7
  2017-10-26 12:18 [Buildroot] [PATCH] sdl2: security bump to version 2.0.7 Peter Korsgaard
  2017-10-27 11:49 ` Peter Korsgaard
@ 2017-10-28 17:15 ` Peter Korsgaard
  2017-11-15 18:52 ` Peter Korsgaard
  2 siblings, 0 replies; 4+ messages in thread
From: Peter Korsgaard @ 2017-10-28 17:15 UTC (permalink / raw)
  To: buildroot

>>>>> "Peter" == Peter Korsgaard <peter@korsgaard.com> writes:

 > Fixes CVE-2017-2888 - An exploitable integer overflow vulnerability exists
 > when creating a new RGB Surface in SDL 2.0.5.  A specially crafted file can
 > cause an integer overflow resulting in too little memory being allocated
 > which can lead to a buffer overflow and potential code execution.  An
 > attacker can provide a specially crafted image file to trigger this
 > vulnerability.

 > Also add a hash for the license file while we're at it.

 > Signed-off-by: Peter Korsgaard <peter@korsgaard.com>

Committed to 2017.02.x, thanks.

-- 
Bye, Peter Korsgaard

^ permalink raw reply	[flat|nested] 4+ messages in thread

* [Buildroot] [PATCH] sdl2: security bump to version 2.0.7
  2017-10-26 12:18 [Buildroot] [PATCH] sdl2: security bump to version 2.0.7 Peter Korsgaard
  2017-10-27 11:49 ` Peter Korsgaard
  2017-10-28 17:15 ` Peter Korsgaard
@ 2017-11-15 18:52 ` Peter Korsgaard
  2 siblings, 0 replies; 4+ messages in thread
From: Peter Korsgaard @ 2017-11-15 18:52 UTC (permalink / raw)
  To: buildroot

>>>>> "Peter" == Peter Korsgaard <peter@korsgaard.com> writes:

 > Fixes CVE-2017-2888 - An exploitable integer overflow vulnerability exists
 > when creating a new RGB Surface in SDL 2.0.5.  A specially crafted file can
 > cause an integer overflow resulting in too little memory being allocated
 > which can lead to a buffer overflow and potential code execution.  An
 > attacker can provide a specially crafted image file to trigger this
 > vulnerability.

 > Also add a hash for the license file while we're at it.

 > Signed-off-by: Peter Korsgaard <peter@korsgaard.com>

Committed to 2017.08.x, thanks.

-- 
Bye, Peter Korsgaard

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2017-11-15 18:52 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2017-10-26 12:18 [Buildroot] [PATCH] sdl2: security bump to version 2.0.7 Peter Korsgaard
2017-10-27 11:49 ` Peter Korsgaard
2017-10-28 17:15 ` Peter Korsgaard
2017-11-15 18:52 ` Peter Korsgaard

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.