Your submission was sent successfully! Close

CVE-2017-9058

Published: 18 May 2017

In libytnef in ytnef through 1.9.2, there is a heap-based buffer over-read due to incorrect boundary checking in the SIZECHECK macro in lib/ytnef.c.

Priority

Medium

CVSS 3 base score: 9.8

Status

Package Release Status
libytnef
Launchpad, Ubuntu, Debian
artful Not vulnerable
(1.9.2-2)
bionic Not vulnerable
(1.9.2-2)
cosmic Not vulnerable
(1.9.2-2)
disco Not vulnerable
(1.9.2-2)
eoan Not vulnerable
(1.9.2-2)
focal Not vulnerable
(1.9.2-2)
groovy Not vulnerable
(1.9.2-2)
hirsute Not vulnerable
(1.9.2-2)
impish Not vulnerable
(1.9.2-2)
jammy Not vulnerable
(1.9.2-2)
precise Does not exist

trusty Does not exist
(trusty was released [1.5-6ubuntu0.2])
upstream
Released (1.9.2-2)
xenial Ignored
(end of standard support, was needed)
yakkety Ignored
(reached end-of-life)
zesty Ignored
(reached end-of-life)
Patches:
distro: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862556