<feed xmlns='http://www.w3.org/2005/Atom'>
<title>buildroot/package/sdl2_image, branch 2019.02-op-build</title>
<subtitle>OpenPOWER buildroot sources</subtitle>
<id>https://git.raptorcs.com/git/buildroot/atom?h=2019.02-op-build</id>
<link rel='self' href='https://git.raptorcs.com/git/buildroot/atom?h=2019.02-op-build'/>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/buildroot/'/>
<updated>2018-04-30T15:38:32+00:00</updated>
<entry>
<title>sdl2_image: security bump to version 2.0.3</title>
<updated>2018-04-30T15:38:32+00:00</updated>
<author>
<name>Peter Korsgaard</name>
<email>peter@korsgaard.com</email>
</author>
<published>2018-04-30T12:04:59+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/buildroot/commit/?id=5fb8fbbb3e776a186731ae929244a82ea2db1878'/>
<id>urn:sha1:5fb8fbbb3e776a186731ae929244a82ea2db1878</id>
<content type='text'>
Fixes the following security issues:

CVE-2017-12122: An exploitable code execution vulnerability exists in the
ILBM image rendering functionality of SDL2_image-2.0.2.  A specially crafted
ILBM image can cause a heap overflow resulting in code execution.  An
attacker can display a specially crafted image to trigger this
vulnerability.

CVE-2017-14440: An exploitable code execution vulnerability exists in the
ILBM image rendering functionality of SDL2_image-2.0.2.  A specially crafted
ILBM image can cause a stack overflow resulting in code execution.  An
attacker can display a specially crafted image to trigger this
vulnerability.

CVE-2017-14441: An exploitable code execution vulnerability exists in the
ICO image rendering functionality of SDL2_image-2.0.2.  A specially crafted
ICO image can cause an integer overflow, cascading to a heap overflow
resulting in code execution.  An attacker can display a specially crafted
image to trigger this vulnerability.

CVE-2017-14442: An exploitable code execution vulnerability exists in the
BMP image rendering functionality of SDL2_image-2.0.2.  A specially crafted
BMP image can cause a stack overflow resulting in code execution.  An
attacker can display a specially crafted image to trigger this
vulnerability.

CVE-2017-14448: An exploitable code execution vulnerability exists in the
XCF image rendering functionality of SDL2_image-2.0.2.  A specially crafted
XCF image can cause a heap overflow resulting in code execution.  An
attacker can display a specially crafted image to trigger this
vulnerability.

CVE-2017-14449: A double-Free vulnerability exists in the XCF image
rendering functionality of SDL2_image-2.0.2.  A specially crafted XCF image
can cause a Double-Free situation to occur.  An attacker can display a
specially crafted image to trigger this vulnerability.

CVE-2017-14450: A buffer overflow vulnerability exists in the GIF image
parsing functionality of SDL2_image-2.0.2.  A specially crafted GIF image
can lead to a buffer overflow on a global section.  An attacker can display
an image to trigger this vulnerability.

For details, see the announcement:

https://discourse.libsdl.org/t/sdl-image-2-0-3-released/23958

Also add a hash for the license file while we're at it.

Signed-off-by: Peter Korsgaard &lt;peter@korsgaard.com&gt;
Signed-off-by: Thomas Petazzoni &lt;thomas.petazzoni@bootlin.com&gt;
</content>
</entry>
<entry>
<title>packages: use SPDX short identifier for zlib license</title>
<updated>2017-04-01T13:35:02+00:00</updated>
<author>
<name>Rahul Bedarkar</name>
<email>rahulbedarkar89@gmail.com</email>
</author>
<published>2017-03-30T13:43:47+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/buildroot/commit/?id=2093053106e3c3c791ed3f9f954c7435fc940f2f'/>
<id>urn:sha1:2093053106e3c3c791ed3f9f954c7435fc940f2f</id>
<content type='text'>
We want to use SPDX identifier for license string as much as possible.
SPDX short identifier for zlib license is Zlib.

This change is done using following command.
find . -name "*.mk" | xargs sed -ri '/LICENSE( )?[\+:]?=/s/zlib( )?(license)?/Zlib/g'

Signed-off-by: Rahul Bedarkar &lt;rahulbedarkar89@gmail.com&gt;
Signed-off-by: Thomas Petazzoni &lt;thomas.petazzoni@free-electrons.com&gt;
</content>
</entry>
<entry>
<title>sdl2_{gfx,image,ttf}: use lower-case package prompt in Config.in</title>
<updated>2016-07-15T14:39:30+00:00</updated>
<author>
<name>Thomas Petazzoni</name>
<email>thomas.petazzoni@free-electrons.com</email>
</author>
<published>2016-07-15T14:39:30+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/buildroot/commit/?id=ce6da7295aba3b065f13da04ca2d625e7c6de561'/>
<id>urn:sha1:ce6da7295aba3b065f13da04ca2d625e7c6de561</id>
<content type='text'>
Signed-off-by: Thomas Petazzoni &lt;thomas.petazzoni@free-electrons.com&gt;
</content>
</entry>
<entry>
<title>sdl2_image: new package</title>
<updated>2016-07-15T14:14:51+00:00</updated>
<author>
<name>Peter Thompson</name>
<email>peter.macleod.thompson@gmail.com</email>
</author>
<published>2016-07-12T14:53:04+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/buildroot/commit/?id=f2ffe91eab49ba357c39f2bb1b5cb5450f5a84e7'/>
<id>urn:sha1:f2ffe91eab49ba357c39f2bb1b5cb5450f5a84e7</id>
<content type='text'>
Signed-off-by: Peter Thompson &lt;peter.macleod.thompson@gmail.com&gt;

[Thomas:
 - remove all sub-options to select the various image formats. Between
   no formats enabled and all formats enabled, the size difference of
   the library is ~30 KB, so it really isn't worth having all those
   sub-options:
   -rwxr-xr-x 1 thomas thomas  22444 juil. 15 15:51 libSDL2_image-2.0.so.0.0.1
   -rwxr-xr-x 1 thomas thomas  59216 juil. 15 15:52 libSDL2_image-2.0.so.0.0.1
   consequently, we simply enable unconditionally all image formats
   that don't have any dependency, and use "automatic" dependencies
   for the 4 formats that require an external library
 - remove the host package variant, as it isn't used anywhere.
 - remove --with-sdl2-prefix and --with-sdl2-exec-prefix, and instead
   add a dependency on host-pkgconf so that pkg-config is used
 - remove --disable-static, this is handled by the autotools-package
   infrastructure already
 - point &lt;pkg&gt;_LICENSE_FILES to an existing file.]
Signed-off-by: Thomas Petazzoni &lt;thomas.petazzoni@free-electrons.com&gt;
</content>
</entry>
</feed>
