** Patch added: "libytnef-lp1666884-zesty.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/libytnef/+bug/1666884/+attachment/4882632/+files/libytnef-lp1666884-zesty.debdiff

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-9058

** Description changed:

  http://www.openwall.com/lists/oss-security/2017/02/15/4
  
  https://github.com/Yeraze/ytnef/pull/27/files
  
  Upstream calls this X41-2017-002 but a bunch of CVEs have been assigned too.
  https://security-tracker.debian.org/tracker/source-package/libytnef
  
  Fixed in zesty. I'd like to copy the Debian stable security patches when
  it's released there.
  
  Quoting from the oss-security post…
  
  Summary and Impact
  ------------------
  Multiple Heap Overflows, out of bound writes and reads, NULL pointer
  dereferences and infinite loops have been discovered in ytnef 1.9 an
  earlier.
  These could be exploited by tricking a user into opening a malicious
  winmail.dat file.
  
  Product Description
  -------------------
  ytnef offers a library and utilities to extract the files from winmail.dat
  files. winmail.dat files are send by Microsoft Outlook when forwarding files
  via e-mail. The vendor was very responsive in providing a patched version.
  
  Analysis
  --------
  Due to the big amount of issues found no detailed analysis is given here.
  Almost all allocations were unchecked and out of bounds checks rarely
  performed in the code.
  
  In total 9 patches were generated for the following issues:
  
  1. Null Pointer Deref / calloc return value not checked
  2. Infinite Loop / DoS
  3. Buffer Overflow in version field
  4. Out of Bound Reads
  5. Integer Overflow
  6. Invalid Write and Integer Overflow
  7. Out of Bounds read
  8. Out of Bounds read and write
  9. Directory Traversal using the filename
+ 
+ Other Info
+ ----------
+ Zesty already got these fixes synced from Debian. Trusty got these fixes 
earlier in May since it was still in main. Recently, there's one more CVE, 
2017-9058 so I've supplied debdiffs for trusty and zesty for that issue, copied 
from Debian's 1.9.2-2 package (which will autosync to artful). For xenial and 
yakkety, I also added the patches that were applied to trusty.
+ 
+ For more about this new issue, see Debian bug 862556

** Bug watch added: Debian Bug tracker #862556
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862556

** Also affects: libytnef (Debian) via
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862556
   Importance: Unknown
       Status: Unknown

** Also affects: libytnef (Ubuntu Xenial)
   Importance: Undecided
       Status: New

** Also affects: libytnef (Ubuntu Trusty)
   Importance: Undecided
       Status: New

** Also affects: libytnef (Ubuntu Zesty)
   Importance: Undecided
       Status: New

** Also affects: libytnef (Ubuntu Yakkety)
   Importance: Undecided
       Status: New

** Changed in: libytnef (Ubuntu Trusty)
       Status: New => Confirmed

** Changed in: libytnef (Ubuntu Xenial)
       Status: New => Confirmed

** Changed in: libytnef (Ubuntu Yakkety)
       Status: New => Confirmed

** Changed in: libytnef (Ubuntu Zesty)
       Status: New => Confirmed

** Description changed:

  http://www.openwall.com/lists/oss-security/2017/02/15/4
  
  https://github.com/Yeraze/ytnef/pull/27/files
  
  Upstream calls this X41-2017-002 but a bunch of CVEs have been assigned too.
  https://security-tracker.debian.org/tracker/source-package/libytnef
  
  Fixed in zesty. I'd like to copy the Debian stable security patches when
  it's released there.
  
  Quoting from the oss-security post…
  
  Summary and Impact
  ------------------
  Multiple Heap Overflows, out of bound writes and reads, NULL pointer
  dereferences and infinite loops have been discovered in ytnef 1.9 an
  earlier.
  These could be exploited by tricking a user into opening a malicious
  winmail.dat file.
  
  Product Description
  -------------------
  ytnef offers a library and utilities to extract the files from winmail.dat
  files. winmail.dat files are send by Microsoft Outlook when forwarding files
  via e-mail. The vendor was very responsive in providing a patched version.
  
  Analysis
  --------
  Due to the big amount of issues found no detailed analysis is given here.
  Almost all allocations were unchecked and out of bounds checks rarely
  performed in the code.
  
  In total 9 patches were generated for the following issues:
  
  1. Null Pointer Deref / calloc return value not checked
  2. Infinite Loop / DoS
  3. Buffer Overflow in version field
  4. Out of Bound Reads
  5. Integer Overflow
  6. Invalid Write and Integer Overflow
  7. Out of Bounds read
  8. Out of Bounds read and write
  9. Directory Traversal using the filename
  
+ Testing Done
+ ------------
+ None
+ 
  Other Info
  ----------
  Zesty already got these fixes synced from Debian. Trusty got these fixes 
earlier in May since it was still in main. Recently, there's one more CVE, 
2017-9058 so I've supplied debdiffs for trusty and zesty for that issue, copied 
from Debian's 1.9.2-2 package (which will autosync to artful). For xenial and 
yakkety, I also added the patches that were applied to trusty.
  
  For more about this new issue, see Debian bug 862556

** Description changed:

  http://www.openwall.com/lists/oss-security/2017/02/15/4
  
  https://github.com/Yeraze/ytnef/pull/27/files
  
  Upstream calls this X41-2017-002 but a bunch of CVEs have been assigned too.
  https://security-tracker.debian.org/tracker/source-package/libytnef
  
  Fixed in zesty. I'd like to copy the Debian stable security patches when
  it's released there.
  
  Quoting from the oss-security post…
  
  Summary and Impact
  ------------------
  Multiple Heap Overflows, out of bound writes and reads, NULL pointer
  dereferences and infinite loops have been discovered in ytnef 1.9 an
  earlier.
  These could be exploited by tricking a user into opening a malicious
  winmail.dat file.
  
  Product Description
  -------------------
  ytnef offers a library and utilities to extract the files from winmail.dat
  files. winmail.dat files are send by Microsoft Outlook when forwarding files
  via e-mail. The vendor was very responsive in providing a patched version.
  
  Analysis
  --------
  Due to the big amount of issues found no detailed analysis is given here.
  Almost all allocations were unchecked and out of bounds checks rarely
  performed in the code.
  
  In total 9 patches were generated for the following issues:
  
  1. Null Pointer Deref / calloc return value not checked
  2. Infinite Loop / DoS
  3. Buffer Overflow in version field
  4. Out of Bound Reads
  5. Integer Overflow
  6. Invalid Write and Integer Overflow
  7. Out of Bounds read
  8. Out of Bounds read and write
  9. Directory Traversal using the filename
  
  Testing Done
  ------------
  None
  
  Other Info
  ----------
  Zesty already got these fixes synced from Debian. Trusty got these fixes 
earlier in May since it was still in main. Recently, there's one more CVE, 
2017-9058 so I've supplied debdiffs for trusty and zesty for that issue, copied 
from Debian's 1.9.2-2 package (which will autosync to artful). For xenial and 
yakkety, I also added the patches that were applied to trusty.
  
  For more about this new issue, see Debian bug 862556
+ 
+ The only reverse dependency for libytnef is evolution.

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1666884

Title:
  libytnef: February 2017 multiple vulnerabilities (X41-2017-002)

Status in libytnef package in Ubuntu:
  Confirmed
Status in libytnef source package in Trusty:
  Confirmed
Status in libytnef source package in Xenial:
  Confirmed
Status in libytnef source package in Yakkety:
  Confirmed
Status in libytnef source package in Zesty:
  Confirmed
Status in libytnef package in Debian:
  Unknown

Bug description:
  http://www.openwall.com/lists/oss-security/2017/02/15/4

  https://github.com/Yeraze/ytnef/pull/27/files

  Upstream calls this X41-2017-002 but a bunch of CVEs have been assigned too.
  https://security-tracker.debian.org/tracker/source-package/libytnef

  Fixed in zesty. I'd like to copy the Debian stable security patches
  when it's released there.

  Quoting from the oss-security post…

  Summary and Impact
  ------------------
  Multiple Heap Overflows, out of bound writes and reads, NULL pointer
  dereferences and infinite loops have been discovered in ytnef 1.9 an
  earlier.
  These could be exploited by tricking a user into opening a malicious
  winmail.dat file.

  Product Description
  -------------------
  ytnef offers a library and utilities to extract the files from winmail.dat
  files. winmail.dat files are send by Microsoft Outlook when forwarding files
  via e-mail. The vendor was very responsive in providing a patched version.

  Analysis
  --------
  Due to the big amount of issues found no detailed analysis is given here.
  Almost all allocations were unchecked and out of bounds checks rarely
  performed in the code.

  In total 9 patches were generated for the following issues:

  1. Null Pointer Deref / calloc return value not checked
  2. Infinite Loop / DoS
  3. Buffer Overflow in version field
  4. Out of Bound Reads
  5. Integer Overflow
  6. Invalid Write and Integer Overflow
  7. Out of Bounds read
  8. Out of Bounds read and write
  9. Directory Traversal using the filename

  Testing Done
  ------------
  None

  Other Info
  ----------
  Zesty already got these fixes synced from Debian. Trusty got these fixes 
earlier in May since it was still in main. Recently, there's one more CVE, 
2017-9058 so I've supplied debdiffs for trusty and zesty for that issue, copied 
from Debian's 1.9.2-2 package (which will autosync to artful). For xenial and 
yakkety, I also added the patches that were applied to trusty.

  For more about this new issue, see Debian bug 862556

  The only reverse dependency for libytnef is evolution.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libytnef/+bug/1666884/+subscriptions

_______________________________________________
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to     : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp

Reply via email to