Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 10 Apr 2013 20:20:05 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: Open Source Security <oss-security@...ts.openwall.com>
Subject: CVE-2010-5109 libytnef buffer overflow

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

So the nice folks at iSIGHT Partners caught this and notified me.

http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083853.html

http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083804.html

https://bugzilla.redhat.com/show_bug.cgi?id=831322

http://sourceforge.net/p/ytnef/bugs/13/

Please use CVE-2010-5109 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=dPsg
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.