News for package unrtf

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 3.0 (quilt)
Source: unrtf
Binary: unrtf
Architecture: any
Version: 0.21.5-2
Maintainer: Willi Mann <[email protected]>
Homepage: http://www.gnu.org/software/unrtf/
Standards-Version: 3.9.5
Vcs-Browser: http://anonscm.debian.org/gitweb/?p=collab-maint/unrtf.git;a=summary
Vcs-Git: git://anonscm.debian.org/collab-maint/unrtf.git
Build-Depends: debhelper (>> 9.0.0), dh-autoreconf
Package-List:
 unrtf deb text optional arch=any
Checksums-Sha1:
 ad42430e67555a25efdbce7be64a31c2e4d6832d 645273 unrtf_0.21.5.orig.tar.gz
 c842d255fe4f58fd59087539c56dc3341c38e91a 6520 unrtf_0.21.5-2.debian.tar.xz
Checksums-Sha256:
 959b095458940e12e09d1b8f465c4230305c1884062a0f40589f3bce2aab5396 645273 unrtf_0.21.5.orig.tar.gz
 aa5ed95dc62d1644a70bb865dbb4b49f27bee0e1f6f5ef1f45b4482c6257e968 6520 unrtf_0.21.5-2.debian.tar.xz
Files:
 8e965b72298935cdb9f8dc9c89620d89 645273 unrtf_0.21.5.orig.tar.gz
 72e895914d6f25ad7835d2c85733e9a1 6520 unrtf_0.21.5-2.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=IC4W
-----END PGP SIGNATURE-----

Changes:
unrtf (0.21.5-2) unstable; urgency=medium

  * Security fixes, closes: #772811
    - Fix CVE-2014-9274: check that accesses to color table stay within bounds
    - Fix CVE-2014-9275: various crashes
  * possible security fixes:
    - Fix Invalid read of size 4 in attr_get_param
    - attr_get_param(): Silence a warning message again

 -- Willi Mann <[email protected]>  Mon, 22 Dec 2014 20:20:33 +0100