Control: tags -1 - moreinfo
On Mon, 31 May 2021 19:41:53 +0200 Tobias Frost wrote:
The diff looks good, but there are some formalities…
- Can you file an "Stable Proposed Updates" unblock request to get an approval.
Approved at #989530.
- Possibly you should file an bug for CVE-2020-16600
Control: tags -1 moreinfo
Hi Bastian,
> > Hi Bastian,
> >
> > thanks for your work on this. We think this update should go via
> > stable-proposed-updates:
>
> Hi,
>
> Thanks for pointing that out. I have modified the changelog accordingly.
>
The diff looks good, but there are some
Am 22.02.21 um 10:15 schrieb Sébastien Delafond:
On 19/02 13:53, Bastian Germann wrote:
* Package name: mupdf
Version : 1.14.0+ds1-4+deb10u3
[...]
* Avoid a use-after-free in fz_drop_band_writer (CVE-2020-16600)
Hi Bastian,
thanks for your work on this. We think this update
On 19/02 13:53, Bastian Germann wrote:
> * Package name: mupdf
>Version : 1.14.0+ds1-4+deb10u3
> [...]
> * Avoid a use-after-free in fz_drop_band_writer (CVE-2020-16600)
Hi Bastian,
thanks for your work on this. We think this update should go via
stable-proposed-updates:
Hi,
I am looking for a sponsor for the package "mupdf" with the upstream fix
for CVE-2020-16600 that affects buster:
* Package name: mupdf
Version : 1.14.0+ds1-4+deb10u3
* URL : http://mupdf.com/
One can download the package with dget using this command:
dget
Package: sponsorship-requests
Severity: normal
Dear mentors,
I am looking for a sponsor for the package "mupdf" with the upstream fix
for CVE-2020-16600 that affects buster:
* Package name: mupdf
Version : 1.14.0+ds1-4+deb10u3
Upstream Author : http://mupdf.com/
* URL
6 matches
Mail list logo