he way, that Bug is currently marked as done.)
> severity 405679 grave
Bug#405679: Buffer overflows in EnhWMFReader::ReadEnhWMF and
WMFReader::ReadRecordParams
Severity set to `grave' from `important'
> close 405679 2.0.4-1
Bug#405679: Buffer overflows in EnhWMFReader::Rea
Processing commands for [EMAIL PROTECTED]:
> severity 405679 important
Bug#405679: Buffer overflows in EnhWMFReader::ReadEnhWMF and
WMFReader::ReadRecordParams
Severity set to `important' from `critical'
> retitle 405679 [fixed for 2.2, cws cmcfixes30] Buffer overflows in
severity 405679 important
retitle 405679 [fixed for 2.2, cws cmcfixes30] Buffer overflows in
EnhWMFReader::ReadEnhWMF and WMFReader::ReadRecordParams
merge 405679 405679
# fixed package for sarge already at the security team
found 405679 1.1.3-9sarge3
close 405679 1.1.3-9sarge4
thanks
Hi,
Daniel
Package: openoffice.org
Version: 2.0.4.dfsg.2-2
Severity: critical
Tags: security patch
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
The security issue and a patch were described at
http://www.openoffice.org/issues/show_bug.cgi?id=70042. From what is
written, this vulnerability can be used to ex
4 matches
Mail list logo