Package "libytnef"
Name: |
libytnef
|
Description: |
This package is just an umbrella for a group of other packages,
it has no description. Description samples from packages in group:
- improved decoder for application/ms-tnef attachments
- improved decoder for application/ms-tnef attachments
|
Latest version: |
1.5-6ubuntu0.2 |
Release: |
trusty (14.04) |
Level: |
security |
Repository: |
main |
Links
Other versions of "libytnef" in Trusty
Packages in group
Deleted packages are displayed in grey.
Changelog
libytnef (1.5-6ubuntu0.2) trusty-security; urgency=medium
* SECURITY UPDATE: heap-based buffer overflow
- debian/patches/CVE-2017-12141-and-9146.patch: fix in ytnef.c.
- CVE-2017-12141
- CVE-2017-9146
* SECURITY UPDATE: heap-based buffer over-read
- debian/patches/CVE-2017-9058.patch: fix in ytnef.c
- CVE-2017-9058
* SECURITY UPDATE: Denial of service
- debian/patches/CVE-2017-9471.patch: fix in ytnef.c
- CVE-2017-9471
* SECURITY UPDATE: Denial of service
- debian/patches/CVE-2017-9473.patch: fix in ytnef.c
- CVE-2017-9473
-- <email address hidden> (Leonidas S. Barbosa) Thu, 31 May 2018 11:01:18 -0300
|
Source diff to previous version |
CVE-2017-12141 |
In ytnef 1.9.2, a heap-based buffer overflow vulnerability was found in the function TNEFFillMapi in ytnef.c, which allows attackers to cause a denia |
CVE-2017-9146 |
The TNEFFillMapi function in lib/ytnef.c in libytnef in ytnef through 1.9.2 does not ensure a nonzero count value before a certain memory allocation, |
CVE-2017-9058 |
In libytnef in ytnef through 1.9.2, there is a heap-based buffer over-read due to incorrect boundary checking in the SIZECHECK macro in lib/ytnef.c. |
CVE-2017-9471 |
In ytnef 1.9.2, the SwapWord function in lib/ytnef.c allows remote attackers to cause a denial of service (heap-based buffer over-read and applicatio |
CVE-2017-9473 |
In ytnef 1.9.2, the TNEFFillMapi function in lib/ytnef.c allows remote attackers to cause a denial of service (memory consumption) via a crafted file |
|
libytnef (1.5-6ubuntu0.1) trusty-security; urgency=medium
* SECURITY UPDATE: multiple security issues
- debian/patches/*: synchronize security fixes with Debian's
1.5-6+deb8u1 release. Thanks to Jordi Mallach.
- CVE-2017-6298, CVE-2017-6299, CVE-2017-6300, CVE-2017-6301,
CVE-2017-6302, CVE-2017-6303, CVE-2017-6304, CVE-2017-6305,
CVE-2017-6306, CVE-2017-6800, CVE-2017-6801, CVE-2017-6802
-- Marc Deslauriers <email address hidden> Fri, 12 May 2017 08:05:19 -0400
|
CVE-2017-6298 |
An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "1 of 9. Null Pointer Deref / calloc return value not checked. |
CVE-2017-6299 |
An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "2 of 9. Infinite Loop / DoS in the TNEFFillMapi function in l |
CVE-2017-6300 |
An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "3 of 9. Buffer Overflow in version field in lib/tnef-types.h. |
CVE-2017-6301 |
An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "4 of 9. Out of Bounds Reads." |
CVE-2017-6302 |
An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "5 of 9. Integer Overflow." |
CVE-2017-6303 |
An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "6 of 9. Invalid Write and Integer Overflow." |
CVE-2017-6304 |
An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "7 of 9. Out of Bounds read." |
CVE-2017-6305 |
An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "8 of 9. Out of Bounds read and write." |
CVE-2017-6306 |
An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "9 of 9. Directory Traversal using the filename; SanitizeFilen |
CVE-2017-6800 |
An issue was discovered in ytnef before 1.9.2. An invalid memory access (heap-based buffer over-read) can occur during handling of LONG data types, r |
CVE-2017-6801 |
An issue was discovered in ytnef before 1.9.2. There is a potential out-of-bounds access with fields of Size 0 in TNEFParse() in libytnef. |
CVE-2017-6802 |
An issue was discovered in ytnef before 1.9.2. There is a potential heap-based buffer over-read on incoming Compressed RTF Streams, related to Decomp |
|
About
-
Send Feedback to @ubuntu_updates