Processing commands for [email protected]:

> tags 993376 + upstream
Bug #993376 [gtkpod] gtkpod: CVE-2021-32732 - stack overflow in embedded 
AtomicParsley code APar_read64
Added tag(s) upstream.
> tags 993375 + upstream
Bug #993375 [gtkpod] gtkpod: CVE-2021-37231 - stack-buffer overflow in embedded 
AtomicParsley code, APar_readX
Added tag(s) upstream.
> tags 993372 + upstream
Bug #993372 [atomicparsley] atomicparsley: CVE-2021-37231 - stack-buffer 
overflow in APar_readX in src/extract.cpp
Added tag(s) upstream.
> forwarded 993372 https://github.com/wez/atomicparsley/issues/30
Bug #993372 [atomicparsley] atomicparsley: CVE-2021-37231 - stack-buffer 
overflow in APar_readX in src/extract.cpp
Set Bug forwarded-to-address to 
'https://github.com/wez/atomicparsley/issues/30'.
> tags 993366 + upstream
Bug #993366 [atomicparsley] atomicparsley: CVE-2021-37232 - stack overflow in 
APar_read64 in src/extract.cpp
Ignoring request to alter tags of bug #993366 to the same tags previously set
> forwarded 993366 https://github.com/wez/atomicparsley/issues/32
Bug #993366 [atomicparsley] atomicparsley: CVE-2021-37232 - stack overflow in 
APar_read64 in src/extract.cpp
Set Bug forwarded-to-address to 
'https://github.com/wez/atomicparsley/issues/32'.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
993366: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993366
993372: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993372
993375: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993375
993376: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993376
Debian Bug Tracking System
Contact [email protected] with problems

Reply via email to