Processing control commands: > tags 860460 + patch Bug #860460 [src:jbig2dec] jbig2dec: CVE-2017-7885: heap-buffer-overflow by integer overflow to bypass the check in the function jbig2_decode_symbol_dict Added tag(s) patch. > tags 860460 + pending Bug #860460 [src:jbig2dec] jbig2dec: CVE-2017-7885: heap-buffer-overflow by integer overflow to bypass the check in the function jbig2_decode_symbol_dict Added tag(s) pending. > tags 860787 + patch Bug #860787 [src:jbig2dec] jbig2dec: CVE-2017-7976: Integer overflow in function jbig2_image_compose Added tag(s) patch. > tags 860787 + pending Bug #860787 [src:jbig2dec] jbig2dec: CVE-2017-7976: Integer overflow in function jbig2_image_compose Added tag(s) pending. > tags 860788 + patch Bug #860788 [src:jbig2dec] jbig2dec: CVE-2017-7975: Out-of-bound memory write vulnerability due to integer overflow in function jbig2_build_huffman_table Added tag(s) patch. > tags 860788 + pending Bug #860788 [src:jbig2dec] jbig2dec: CVE-2017-7975: Out-of-bound memory write vulnerability due to integer overflow in function jbig2_build_huffman_table Added tag(s) pending.
-- 860460: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860460 860787: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860787 860788: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860788 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems