Hi Salvatore,

On 2018-07-21 00:01, Salvatore Bonaccorso wrote:
> Source: confuse
> Version: 3.2.1+dfsg-1
> Severity: important
> Tags: security upstream
> Forwarded: https://github.com/martinh/libconfuse/issues/109
> 
> Hi,
> 
> The following vulnerability was published for confuse, filling this
> bug to track the upstream issue reporter.
> 
> CVE-2018-14447[0]:
> | trim_whitespace in lexer.l in libConfuse v3.2.1 has an out-of-bounds
> | read.
> 
> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> 
> For further information see:
> 
> [0] https://security-tracker.debian.org/tracker/CVE-2018-14447
>     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14447
> [1] https://github.com/martinh/libconfuse/issues/109

Now that the fix is available upstream, I have just fixed the bug in
sid. Do you want me to also prepare a package for stretch?

Aurelien

-- 
Aurelien Jarno                          GPG: 4096R/1DDD8C9B
aurel...@aurel32.net                 http://www.aurel32.net

Attachment: signature.asc
Description: PGP signature

Reply via email to