Hello,
I'm not sure whether anyone is reading this since if I understood the
conversation at
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844611 correctly,
this package is currently already orphaned.
In any case, I revisited this report that I made some years ago and I
can confirm that this
Processing commands for cont...@bugs.debian.org:
> severity 862707 important
Bug #862707 [libytnef] Heap-buffer overrun: write extra bytes in TNEFFillMapi
Severity set to 'important' from 'normal'
> forwarded 862707 https://github.com/Yeraze/ytnef/issues/47
Bug #862707 [libytnef] Heap-buffer over
Processing commands for cont...@bugs.debian.org:
> severity 862707 important
Bug #862707 [libytnef] Heap-buffer overrun: write extra bytes in TNEFFillMapi
Ignoring request to change severity of Bug 862707 to the same value.
> forwarded 862707 https://github.com/Yeraze/ytnef/issues/47
Bug #862707
Processing commands for cont...@bugs.debian.org:
> found 862707 1.9.2-1
Bug #862707 [libytnef] Heap-buffer overrun: write extra bytes in TNEFFillMapi
There is no source info for the package 'libytnef' at version '1.9.2-1' with
architecture ''
Unable to make a source version for version '1.9.2-1'
Processing commands for cont...@bugs.debian.org:
> retitle 862707 libytnef: CVE-2017-9146: Heap-buffer overrun: write extra
> bytes in TNEFFillMapi
Bug #862707 [libytnef] Heap-buffer overrun: write extra bytes in TNEFFillMapi
Changed Bug title to 'libytnef: CVE-2017-9146: Heap-buffer overrun: wr
Processing commands for cont...@bugs.debian.org:
> # increase severity since this will be fixed in jessie via DSA, and thus
> causing regression in unfixed in stretch
> severity 862556 serious
Bug #862556 [libytnef] CVE-2017-9058: Heap-based buffer overflow due to
incorrect boundary checking
Sev
6 matches
Mail list logo