Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Fri, 02 Jul 2021 05:21:43 +0900
Source: kimageformats
Architecture: source
Version: 5.78.0-5
Distribution: unstable
Urgency: medium
Maintainer: Debian Qt/KDE Maintainers
Changed-By: Norbert Preining
Closes: 990527
Ch
kimageformats_5.78.0-5_source.changes uploaded successfully to localhost
along with the files:
kimageformats_5.78.0-5.dsc
kimageformats_5.78.0-5.debian.tar.xz
kimageformats_5.78.0-5_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Your message dated Thu, 01 Jul 2021 20:33:25 +
with message-id
and subject line Bug#990527: fixed in kimageformats 5.78.0-5
has caused the Debian Bug report #990527,
regarding kimageformats: CVE-2021-36083
to be marked as done.
This means that you claim that the problem has been dealt with.
I
Hi
> CVE-2021-36083[0]:
kimageformats_5.78.0-5_source.changes uploaded with the fix.
Thanks
Norbert
--
PREINING Norbert https://www.preining.info
Fujitsu Research + IFMGA Guide + TU Wien + TeX Live + Debian Dev
GPG: 0x860CDC13 fp: F7D8 A928 26E3 16A1 9FA0
Processing commands for cont...@bugs.debian.org:
> found 990527 5.78.0-4
Bug #990527 [src:kimageformats] kimageformats: CVE-2021-36083
Marked as found in versions kimageformats/5.78.0-4.
> close 990527 5.83.0-1
Bug #990527 [src:kimageformats] kimageformats: CVE-2021-36083
Marked as fixed in versio
Source: kimageformats
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security
Hi,
The following vulnerability was published for kimageformats.
CVE-2021-36083[0]:
| KDE KImageFormats 5.70.0 through 5.81.0 has a stack-based buffer
| overflow in XCFImageFormat::loadTileRLE.
https://b
6 matches
Mail list logo