Processing commands for [email protected]: > tags 993376 + upstream Bug #993376 [gtkpod] gtkpod: CVE-2021-32732 - stack overflow in embedded AtomicParsley code APar_read64 Added tag(s) upstream. > tags 993375 + upstream Bug #993375 [gtkpod] gtkpod: CVE-2021-37231 - stack-buffer overflow in embedded AtomicParsley code, APar_readX Added tag(s) upstream. > tags 993372 + upstream Bug #993372 [atomicparsley] atomicparsley: CVE-2021-37231 - stack-buffer overflow in APar_readX in src/extract.cpp Added tag(s) upstream. > forwarded 993372 https://github.com/wez/atomicparsley/issues/30 Bug #993372 [atomicparsley] atomicparsley: CVE-2021-37231 - stack-buffer overflow in APar_readX in src/extract.cpp Set Bug forwarded-to-address to 'https://github.com/wez/atomicparsley/issues/30'. > tags 993366 + upstream Bug #993366 [atomicparsley] atomicparsley: CVE-2021-37232 - stack overflow in APar_read64 in src/extract.cpp Ignoring request to alter tags of bug #993366 to the same tags previously set > forwarded 993366 https://github.com/wez/atomicparsley/issues/32 Bug #993366 [atomicparsley] atomicparsley: CVE-2021-37232 - stack overflow in APar_read64 in src/extract.cpp Set Bug forwarded-to-address to 'https://github.com/wez/atomicparsley/issues/32'. > thanks Stopping processing here.
Please contact me if you need assistance. -- 993366: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993366 993372: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993372 993375: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993375 993376: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993376 Debian Bug Tracking System Contact [email protected] with problems

