Control: tags -1 + pending
On Mon, 2017-09-18 at 15:56 -0600, Bdale Garbee wrote:
> The pcb-rnd upstream has released a patch that closes a hole
> through which arbitrary code can be executed if a user opens a
> maliciously crafted printed circuit board design file.
>
Flagged for acceptance into
Processing control commands:
> tags -1 + pending
Bug #876139 [release.debian.org] stretch-pu: package pcb-rnd
Added tag(s) pending.
--
876139: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876139
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Package: release.debian.org
The pcb-rnd upstream has released a patch that closes a hole
through which arbitrary code can be executed if a user opens a
maliciously crafted printed circuit board design file.
There is no known instance of this being exploited in the field, there
is no root escalati
3 matches
Mail list logo