Hello Chris,
Do you have WIP for python-django LTS fixes? Can I work on it without
duplicating effort? Thought I'd check, since you're the maintainer.
--
Sean Whitton
signature.asc
Description: PGP signature
Hello Bastien,
Is there someway I could help with imagemagick under LTS? It looks like
the status has been unchanged for some months. I'm not an expert but I
can review things. Thanks!
--
Sean Whitton
Hello,
On Mon 26 Feb 2024 at 09:38am +01, Jakub Jelen wrote:
> This CVE is about checking return code from the crypto library API
> calls, which could fail and cause some unexpected behavior such as
> usage of uninitialized memory, DoS, ... Our analysis did not show any
> important exploitable
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian LTS Advisory DLA-3741-1debian-...@lists.debian.org
https://www.debian.org/lts/security/Thorsten Alteholz
February 26, 2024
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 25 Feb 2024 16:03:02 +0100
Source: engrampa
Architecture: source
Version: 1.20.2-1+deb10u1
Distribution: buster-security
Urgency: high
Maintainer: Debian+Ubuntu MATE Packaging Team
Changed-By: Thorsten Alteholz
Changes:
-
Debian LTS Advisory DLA-3740-1debian-...@lists.debian.org
https://www.debian.org/lts/security/ Guilhem Moulin
February 26, 2024 https://wiki.debian.org/LTS
Hi,
This CVE is about checking return code from the crypto library API
calls, which could fail and cause some unexpected behavior such as
usage of uninitialized memory, DoS, ... Our analysis did not show any
important exploitable code path (but it was in supported libssh
versions -- this might not