|
Message-ID: <51661DD5.6060708@redhat.com> Date: Wed, 10 Apr 2013 20:20:05 -0600 From: Kurt Seifried <kseifried@...hat.com> To: Open Source Security <oss-security@...ts.openwall.com> Subject: CVE-2010-5109 libytnef buffer overflow -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 So the nice folks at iSIGHT Partners caught this and notified me. http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083853.html http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083804.html https://bugzilla.redhat.com/show_bug.cgi?id=831322 http://sourceforge.net/p/ytnef/bugs/13/ Please use CVE-2010-5109 for this issue. - -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux) iQIcBAEBAgAGBQJRZh3VAAoJEBYNRVNeJnmTKpQQAIqEm83FKFq5r8vpH6tf7m/F lq9FIT8yE4raldIgDSHhJHhLsNrh3yFrGc06tPddLLfVkNbPnPAdtKjilmMoNIPt abnPzwngKiui846wKlYFxt5/hEvgOSmvM15rdUXrcn3wHd/gnAAYFysynyGJZlRw ANkuLeIhkKWf1NBEjJCaxFsmk/D4nNsxhpj1ccPkmvgMMws59ias8DeCE2xdu0MS 5Lb9zsrj9ewhoef6pt6arVfVqBJy4O8b/RIcPulw+F155VEvKQmbIHJ+HjuIloMx y9mBD2Ax3KxPtYgx6fYzj6mTNvk6oEBFHTITHCPffYGciZb0p36NYsWBrXlrmBRZ UqDVTF9NKkRZA3ULeX3MNDy1KDBYgL6xVXi43hHnuFsq2uE3kQZdrnErDOW0F0lq IbZuS5bSYGfWGAz69CoZ67uxoxQ58FyDWG2hGdxCurFGT6xqJvddFi8lzfPbnaQK ebEK6ShRe8JSQsBsl2W3lyG6O0nkxkq1RUCRkQtWMXhwV2I4TQNN4cSrCko8lGjm GBOp30aUp2nzwPJTJTmgyKylsJquGXJdLbFVhaoLmjo4iMRtrm6G+DqPtF5vYhyD u9qqDtOkJgv40Ifbcc/VoQq3jwK65savIHuZLF/zlJBWXxcjR8dV9wxDeOt7Ladn B10gwdklHGCTSFQtVXtf =dPsg -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.