Bug#863279: jbig2dec: CVE-2017-9216: NULL pointer dereference in the jbig2_huffman_get function

2017-05-27 Thread Salvatore Bonaccorso
Control: tags -1 + fixed-upstream On Wed, May 24, 2017 at 08:40:44PM +0200, Salvatore Bonaccorso wrote: > Source: jbig2dec > Version: 0.13-1 > Severity: important > Tags: upstream security > Forwarded: https://bugs.ghostscript.com/show_bug.cgi?id=697934 > > Hi, > > the following vulnerability wa

Processed: Re: Bug#863279: jbig2dec: CVE-2017-9216: NULL pointer dereference in the jbig2_huffman_get function

2017-05-27 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + fixed-upstream Bug #863279 [src:jbig2dec] jbig2dec: CVE-2017-9216: NULL pointer dereference in the jbig2_huffman_get function Added tag(s) fixed-upstream. -- 863279: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863279 Debian Bug Tracking System Conta

Bug#855325: marked as done (libgs9: I updated yesterday my Wheeze System and now libgs.so.9 seggfault while printing with cups)

2017-05-27 Thread Debian Bug Tracking System
Your message dated Sat, 27 May 2017 16:59:57 +0200 with message-id <1582298.geqncrb...@odyx.org> and subject line Re: Bug#855325: Acknowledgement (libgs9: I updated yesterday my Wheeze System and now libgs.so.9 seggfault while printing with cups) has caused the Debian Bug report #855325, regarding

jbig2dec_0.13-4~deb8u2_allonly.changes ACCEPTED into proposed-updates->stable-new, proposed-updates

2017-05-27 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Tue, 16 May 2017 22:35:00 +0200 Source: jbig2dec Binary: libjbig2dec0-dev libjbig2dec0 jbig2dec Architecture: source Version: 0.13-4~deb8u2 Distribution: jessie-security Urgency: high Maintainer: Debian Printing Team C

Bug#860788: marked as done (jbig2dec: CVE-2017-7975: Out-of-bound memory write vulnerability due to integer overflow in function jbig2_build_huffman_table)

2017-05-27 Thread Debian Bug Tracking System
Your message dated Sat, 27 May 2017 12:32:38 + with message-id and subject line Bug#860788: fixed in jbig2dec 0.13-4~deb8u2 has caused the Debian Bug report #860788, regarding jbig2dec: CVE-2017-7975: Out-of-bound memory write vulnerability due to integer overflow in function jbig2_build_huff

Bug#860787: marked as done (jbig2dec: CVE-2017-7976: Integer overflow in function jbig2_image_compose )

2017-05-27 Thread Debian Bug Tracking System
Your message dated Sat, 27 May 2017 12:32:38 + with message-id and subject line Bug#860787: fixed in jbig2dec 0.13-4~deb8u2 has caused the Debian Bug report #860787, regarding jbig2dec: CVE-2017-7976: Integer overflow in function jbig2_image_compose to be marked as done. This means that you

Bug#860460: marked as done (jbig2dec: CVE-2017-7885: heap-buffer-overflow by integer overflow to bypass the check in the function jbig2_decode_symbol_dict)

2017-05-27 Thread Debian Bug Tracking System
Your message dated Sat, 27 May 2017 12:32:38 + with message-id and subject line Bug#860460: fixed in jbig2dec 0.13-4~deb8u2 has caused the Debian Bug report #860460, regarding jbig2dec: CVE-2017-7885: heap-buffer-overflow by integer overflow to bypass the check in the function jbig2_decode_sy