libytnef: Buffer overflow (CVE-2010-5109)

Related Vulnerabilities: CVE-2010-5109  

Debian Bug report logs - #705468
libytnef: Buffer overflow (CVE-2010-5109)

version graph

Package: libytnef; Maintainer for libytnef is Ricardo Mones <mones@debian.org>;

Reported by: Henri Salo <henri@nerv.fi>

Date: Mon, 15 Apr 2013 11:51:02 UTC

Severity: normal

Tags: security

Found in version 1.5-4

Fixed in version libytnef/1.5-5

Done: Matthias Klose <doko@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Debian QA Group <packages@qa.debian.org>:
Bug#705468; Package libytnef. (Mon, 15 Apr 2013 11:51:06 GMT) (full text, mbox, link).


Acknowledgement sent to Henri Salo <henri@nerv.fi>:
New Bug report received and forwarded. Copy sent to Debian QA Group <packages@qa.debian.org>. (Mon, 15 Apr 2013 11:51:06 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Henri Salo <henri@nerv.fi>
To: submit@bugs.debian.org
Subject: libytnef: Buffer overflow (CVE-2010-5109)
Date: Mon, 15 Apr 2013 14:47:57 +0300
[Message part 1 (text/plain, inline)]
Package: libytnef
Version: 1.5-4
Severity: normal
Tags: security

Upstream bug: http://sourceforge.net/p/ytnef/bugs/13/
Red Hat bug: https://bugzilla.redhat.com/show_bug.cgi?id=831322
Red Hat fix: https://bugzilla.redhat.com/attachment.cgi?id=596239&action=diff

---
Henri Salo
[signature.asc (application/pgp-signature, inline)]

Reply sent to Matthias Klose <doko@debian.org>:
You have taken responsibility. (Thu, 10 Oct 2013 12:51:09 GMT) (full text, mbox, link).


Notification sent to Henri Salo <henri@nerv.fi>:
Bug acknowledged by developer. (Thu, 10 Oct 2013 12:51:09 GMT) (full text, mbox, link).


Message #10 received at 705468-close@bugs.debian.org (full text, mbox, reply):

From: Matthias Klose <doko@debian.org>
To: 705468-close@bugs.debian.org
Subject: Bug#705468: fixed in libytnef 1.5-5
Date: Thu, 10 Oct 2013 12:48:28 +0000
Source: libytnef
Source-Version: 1.5-5

We believe that the bug you reported is fixed in the latest version of
libytnef, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 705468@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Matthias Klose <doko@debian.org> (supplier of updated libytnef package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Thu, 10 Oct 2013 14:16:21 +0200
Source: libytnef
Binary: libytnef0 libytnef0-dev
Architecture: source amd64
Version: 1.5-5
Distribution: unstable
Urgency: low
Maintainer: Debian QA Group <packages@qa.debian.org>
Changed-By: Matthias Klose <doko@debian.org>
Description: 
 libytnef0  - improved decoder for application/ms-tnef attachments
 libytnef0-dev - improved decoder for application/ms-tnef attachments
Closes: 705468
Changes: 
 libytnef (1.5-5) unstable; urgency=low
 .
   * QA upload.
   * Use dh_autotools-dev to update config.{sub,guess} for AArch64.
   * Fix heap overflow (CVE-2010-5109). Closes: #705468.
   * Use dpkg-buildflags for the build.
Checksums-Sha1: 
 c40d0ef8fa4a634d43a8975dfec5381a2b52e8e4 1130 libytnef_1.5-5.dsc
 cbe16de5282ecfdaa946173c7d3f819a04e12ead 380636 libytnef_1.5-5.debian.tar.gz
 9bfc8f0dd770d96ba0e7c7b8e3a99ec3ff1208dc 18962 libytnef0_1.5-5_amd64.deb
 a1a01b46c76de31a2a1663fe381ffbc8917f2c81 23634 libytnef0-dev_1.5-5_amd64.deb
Checksums-Sha256: 
 a0c91fc6fab99f67ab9cbc680858a9367ce534d164d334b53b695bcaa3094d6f 1130 libytnef_1.5-5.dsc
 6362328b11e77cc6debc4ebcc406da240f9d7af95e998ee9de3fd5d68d5bed13 380636 libytnef_1.5-5.debian.tar.gz
 b7ef9535ad556a2fca1ff49d0e4b602ec72154e2c3a53e16819cce6621c2e6a4 18962 libytnef0_1.5-5_amd64.deb
 1ddd3591e2669c253b0b078d66ac8c8719812b8de36bbef7286ca22439a568e4 23634 libytnef0-dev_1.5-5_amd64.deb
Files: 
 3f8f9113d1e61eb04298cd9881f0d996 1130 utils extra libytnef_1.5-5.dsc
 6ea1832805d1d127bf500bf53645b302 380636 utils extra libytnef_1.5-5.debian.tar.gz
 bf2ca9bdff1487dca370e54500553c06 18962 libs extra libytnef0_1.5-5_amd64.deb
 a0df24b75e1ea8ef2c9e14edd3dcd71c 23634 libdevel extra libytnef0-dev_1.5-5_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.15 (GNU/Linux)

iEYEARECAAYFAlJWnb0ACgkQStlRaw+TLJz++wCgwSw8q8ic5LARLNzogyzLbR0/
+bAAoKpU+IxREmCz6fUNXX3CId+KKr5u
=HzYW
-----END PGP SIGNATURE-----




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Mon, 18 Nov 2013 07:30:34 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 16:16:52 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.