sdl2: security bump to version 2.0.7
authorPeter Korsgaard <peter@korsgaard.com>
Thu, 26 Oct 2017 12:18:43 +0000 (14:18 +0200)
committerPeter Korsgaard <peter@korsgaard.com>
Fri, 27 Oct 2017 11:48:45 +0000 (13:48 +0200)
commit07a9f0200cfd1c34f33e8054f62b990d05ccb934
tree3ed046ad2a568c03b2a2fc9456dd216687f0aa88
parent3a798acf239dee04d573f575337bf823c13020fd
sdl2: security bump to version 2.0.7

Fixes CVE-2017-2888 - An exploitable integer overflow vulnerability exists
when creating a new RGB Surface in SDL 2.0.5.  A specially crafted file can
cause an integer overflow resulting in too little memory being allocated
which can lead to a buffer overflow and potential code execution.  An
attacker can provide a specially crafted image file to trigger this
vulnerability.

Also add a hash for the license file while we're at it.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
package/sdl2/sdl2.hash
package/sdl2/sdl2.mk