Source: openexr
Version: 2.2.0-11
Severity: important
Tags: security upstream
Forwarded: https://github.com/openexr/openexr/issues/248
Hi,
the following vulnerability was published for openexr.
CVE-2017-14988[0]:
| Header::readfrom in IlmImf/ImfHeader.cpp in OpenEXR 2.2.0 allows remote
|
Your message dated Sat, 14 Oct 2017 13:49:09 +
with message-id
and subject line Bug#875094: fixed in pfstools 2.0.6-3
has caused the Debian Bug report #875094,
regarding [pfstools] Future Qt4 removal from Buster
to be marked as done.
This means that you
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 14 Oct 2017 15:16:36 +0200
Source: pfstools
Binary: pfstools pfsglview pfsview pfstools-dbg libpfs-dev libpfs2
octave-pfstools pfstmo
Architecture: source
Version: 2.0.6-3
Distribution: experimental
Urgency: low
pfstools_2.0.6-3_multi.changes uploaded successfully to localhost
along with the files:
pfstools_2.0.6-3.dsc
pfstools_2.0.6-3.debian.tar.xz
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
___
Pkg-phototools-devel