Processing control commands: > tags 860460 + patch Bug #860460 [src:jbig2dec] jbig2dec: CVE-2017-7885: heap-buffer-overflow by integer overflow to bypass the check in the function jbig2_decode_symbol_dict Ignoring request to alter tags of bug #860460 to the same tags previously set > tags 860460 + pending Bug #860460 [src:jbig2dec] jbig2dec: CVE-2017-7885: heap-buffer-overflow by integer overflow to bypass the check in the function jbig2_decode_symbol_dict Ignoring request to alter tags of bug #860460 to the same tags previously set > tags 860787 + patch Bug #860787 [src:jbig2dec] jbig2dec: CVE-2017-7976: Integer overflow in function jbig2_image_compose Ignoring request to alter tags of bug #860787 to the same tags previously set > tags 860787 + pending Bug #860787 [src:jbig2dec] jbig2dec: CVE-2017-7976: Integer overflow in function jbig2_image_compose Ignoring request to alter tags of bug #860787 to the same tags previously set > tags 860788 + patch Bug #860788 [src:jbig2dec] jbig2dec: CVE-2017-7975: Out-of-bound memory write vulnerability due to integer overflow in function jbig2_build_huffman_table Ignoring request to alter tags of bug #860788 to the same tags previously set > tags 860788 + pending Bug #860788 [src:jbig2dec] jbig2dec: CVE-2017-7975: Out-of-bound memory write vulnerability due to integer overflow in function jbig2_build_huffman_table Ignoring request to alter tags of bug #860788 to the same tags previously set
-- 860460: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860460 860787: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860787 860788: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860788 Debian Bug Tracking System Contact [email protected] with problems
