Debian Package Tracker
Register | Log in
Subscribe

tnef

Tool to unpack MIME application/ms-tnef attachments

Choose email to subscribe with

general
  • source: tnef (main)
  • version: 1.4.18-2
  • maintainer: Gürkan Myczko (DMD) (LowNMU)
  • arch: any
  • std-ver: 4.5.0
  • VCS: unknown
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1.4.9-1+deb8u3
  • o-o-sec: 1.4.9-1+deb8u4
  • oldstable: 1.4.12-1.2
  • stable: 1.4.12-1.2
  • testing: 1.4.18-2
  • unstable: 1.4.18-2
versioned links
  • 1.4.9-1+deb8u3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.4.9-1+deb8u4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.4.12-1.2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.4.18-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • tnef
action needed
O: This package has been orphaned and needs a maintainer. normal
This package has been orphaned. This means that it does not have a real maintainer at the moment. Please consider adopting this package if you are interested in it. Please see bug number #975033 for more information.
Created: 2020-11-18 Last update: 2020-11-18 10:32
1 ignored security issue in stretch low
There is 1 open security issue in stretch.
1 issue skipped by the security teams:
  • CVE-2019-18849: In tnef before 1.4.18, an attacker may be able to write to the victim's .ssh/authorized_keys file via an e-mail message with a crafted winmail.dat application/ms-tnef attachment, because of a heap-based buffer over-read involving strdup.
Please fix it.
Created: 2019-11-11 Last update: 2020-11-11 05:35
1 ignored security issue in buster low
There is 1 open security issue in buster.
1 issue skipped by the security teams:
  • CVE-2019-18849: In tnef before 1.4.18, an attacker may be able to write to the victim's .ssh/authorized_keys file via an e-mail message with a crafted winmail.dat application/ms-tnef attachment, because of a heap-based buffer over-read involving strdup.
Please fix it.
Created: 2019-11-11 Last update: 2020-11-11 05:35
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.5.1 instead of 4.5.0).
Created: 2020-11-17 Last update: 2020-11-17 05:41
news
[rss feed]
  • [2020-11-11] tnef 1.4.18-2 MIGRATED to testing (Debian testing watch)
  • [2020-11-05] Accepted tnef 1.4.18-2 (source) into unstable (Gürkan Myczko) (signed by: Bart Martens)
  • [2019-12-11] tnef 1.4.18-1 MIGRATED to testing (Debian testing watch)
  • [2019-12-06] Accepted tnef 1.4.18-1 (source) into unstable (Gürkan Myczko) (signed by: Adam Borowski)
  • [2019-11-29] Accepted tnef 1.4.9-1+deb8u4 (source amd64) into oldoldstable (Utkarsh Gupta) (signed by: Mike Gabriel)
  • [2017-06-12] Accepted tnef 1.4.9-1+deb8u3 (source amd64) into proposed-updates->stable-new, proposed-updates (Thorsten Alteholz)
  • [2017-06-01] tnef 1.4.12-1.2 MIGRATED to testing (Debian testing watch)
  • [2017-05-29] Accepted tnef 1.4.12-1.2 (source amd64) into unstable (Thorsten Alteholz)
  • [2017-05-29] Accepted tnef 1.4.9-1+deb7u3 (source amd64) into oldstable (Thorsten Alteholz)
  • [2017-04-02] tnef 1.4.12-1.1 MIGRATED to testing (Debian testing watch)
  • [2017-03-30] Accepted tnef 1.4.9-1+deb8u2 (source amd64) into proposed-updates->stable-new, proposed-updates (Thorsten Alteholz)
  • [2017-03-30] Accepted tnef 1.4.12-1.1 (source amd64) into unstable (Thorsten Alteholz)
  • [2017-03-24] Accepted tnef 1.4.9-1+deb7u2 (source amd64) into oldstable (Thorsten Alteholz)
  • [2017-03-09] Accepted tnef 1.4.9-1+deb8u1 (source amd64) into proposed-updates->stable-new, proposed-updates (Thorsten Alteholz)
  • [2017-02-27] Accepted tnef 1.4.9-1+deb7u1 (source amd64) into oldstable (Thorsten Alteholz)
  • [2016-10-26] tnef 1.4.12-1 MIGRATED to testing (Debian testing watch)
  • [2016-10-15] Accepted tnef 1.4.12-1 (source amd64) into unstable (Kevin Coyner)
  • [2012-05-08] tnef 1.4.9-1 MIGRATED to testing (Debian testing watch)
  • [2012-04-27] Accepted tnef 1.4.9-1 (source amd64) (Kevin Coyner)
  • [2012-04-27] Accepted tnef 1.4.8-2 (source amd64) (Kevin Coyner)
  • [2011-04-30] tnef 1.4.8-1 MIGRATED to testing (Debian testing watch)
  • [2011-04-19] Accepted tnef 1.4.8-1 (source amd64) (Kevin Coyner)
  • [2010-02-22] tnef 1.4.7-1 MIGRATED to testing (Debian testing watch)
  • [2010-02-12] Accepted tnef 1.4.7-1 (source amd64) (Kevin Coyner)
  • [2009-10-18] tnef 1.4.6-1 MIGRATED to testing (Debian testing watch)
  • [2009-10-06] Accepted tnef 1.4.6-1 (source amd64) (Kevin Coyner)
  • [2009-02-16] tnef 1.4.5-1 MIGRATED to testing (Debian testing watch)
  • [2008-10-04] Accepted tnef 1.4.5-1 (source i386) (Kevin Coyner)
  • [2007-08-16] tnef 1.4.3-2 MIGRATED to testing (Debian testing watch)
  • [2007-08-05] Accepted tnef 1.4.3-2 (source i386) (Kevin Coyner)
  • 1
  • 2
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian
  • buildd: logs, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.4.18-2

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing