Processing commands for cont...@bugs.debian.org:
> tags 926670 + upstream fixed-upstream
Bug #926670 [src:node-xterm] CVE-2019-0542
Added tag(s) fixed-upstream and upstream.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
926670: https://bugs.debian.org/cgi-bin/bu
Source: node-xterm
Severity: grave
Tags: security
Please see http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0542
Cheers,
Moritz
--
Pkg-javascript-devel mailing list
Pkg-javascript-devel@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-javascri
node-deep-extend 0.4.1-2 is unblocked
Message transféré
Sujet : Bug#926650 closed by Ivo De Decker
(unblock node-deep-extend)
Date : Mon, 08 Apr 2019 14:36:04 +
De : Debian Bug Tracking System
Répondre à : 926...@bugs.debian.org
Pour : Xavier Guimard
This is an automatic
Your message dated Mon, 08 Apr 2019 13:18:48 +
with message-id
and subject line Bug#926616: fixed in node-deep-extend 0.4.1-2
has caused the Debian Bug report #926616,
regarding CVE-2018-3750: Prototype Pollution
to be marked as done.
This means that you claim that the problem has been dealt
Processing control commands:
> tag -1 pending
Bug #926616 [node-deep-extend] CVE-2018-3750: Prototype Pollution
Added tag(s) pending.
--
926616: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926616
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--
Pkg-javascript-dev
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
Please unblock package node-deep-extend
Hi all,
node-deep-extend is vulnerable to CVE-2018-3750 [1]. This vulnerability
has been tagged as unimportant, however patch is simple and package
Processing commands for cont...@bugs.debian.org:
> tags 926616 + upstream
Bug #926616 [node-deep-extend] CVE-2018-3750: Prototype Pollution
Added tag(s) upstream.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
926616: https://bugs.debian.org/cgi-bin/bugreport.cgi