Processed: Re: Bug#405679: Buffer overflows in EnhWMFReader::ReadEnhWMF and WMFReader::ReadRecordParams

2007-01-05 Thread Debian Bug Tracking System
he way, that Bug is currently marked as done.) > severity 405679 grave Bug#405679: Buffer overflows in EnhWMFReader::ReadEnhWMF and WMFReader::ReadRecordParams Severity set to `grave' from `important' > close 405679 2.0.4-1 Bug#405679: Buffer overflows in EnhWMFReader::Rea

Processed: Re: Bug#405679: Buffer overflows in EnhWMFReader::ReadEnhWMF and WMFReader::ReadRecordParams

2007-01-05 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: > severity 405679 important Bug#405679: Buffer overflows in EnhWMFReader::ReadEnhWMF and WMFReader::ReadRecordParams Severity set to `important' from `critical' > retitle 405679 [fixed for 2.2, cws cmcfixes30] Buffer overflows in

Bug#405679: Buffer overflows in EnhWMFReader::ReadEnhWMF and WMFReader::ReadRecordParams

2007-01-05 Thread Rene Engelhard
severity 405679 important retitle 405679 [fixed for 2.2, cws cmcfixes30] Buffer overflows in EnhWMFReader::ReadEnhWMF and WMFReader::ReadRecordParams merge 405679 405679 # fixed package for sarge already at the security team found 405679 1.1.3-9sarge3 close 405679 1.1.3-9sarge4 thanks Hi, Daniel

Bug#405679: Buffer overflows in EnhWMFReader::ReadEnhWMF and WMFReader::ReadRecordParams

2007-01-05 Thread Daniel Leidert
Package: openoffice.org Version: 2.0.4.dfsg.2-2 Severity: critical Tags: security patch -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 The security issue and a patch were described at http://www.openoffice.org/issues/show_bug.cgi?id=70042. From what is written, this vulnerability can be used to ex