Source: pcb-rnd Version: 1.1.4-1 Severity: important Tags: upstream security Control: fixed -1 1.2.5-2 Control: fixed -1 1.1.4-2
Filling this bug to have a clear tracking id within the Debian BTS as least, since there is no CVE id to track the issue: pcb-rnd (1.2.5-2) unstable; urgency=high * security patch from upstream to eliminate execution of code from a maliciously formed design file -- Bdale Garbee <bd...@gag.com> Sun, 17 Sep 2017 18:23:29 -0600 There is already the fix in unstable, and the fix for stretch-pu pending. Regards, Salvatore