Source: gpac
Version: 2.2.1+dfsg1-3
Severity: important
Tags: security upstream
Forwarded: https://github.com/gpac/gpac/issues/2633
X-Debbugs-Cc: car...@debian.org, Debian Security Team
Hi,
The following vulnerability was published for gpac.
CVE-2023-5595[0]:
| Denial of Service in GitHub
Source: gpac
Version: 2.2.1+dfsg1-3
Severity: important
Tags: security upstream
Forwarded: https://github.com/gpac/gpac/issues/2632
X-Debbugs-Cc: car...@debian.org, Debian Security Team
Hi,
The following vulnerability was published for gpac.
CVE-2023-5586[0]:
| NULL Pointer Dereference in
Source: gpac
Version: 2.2.1+dfsg1-3
Severity: important
Tags: security upstream
Forwarded: https://github.com/gpac/gpac/issues/2606
X-Debbugs-Cc: car...@debian.org, Debian Security Team
Hi,
The following vulnerability was published for gpac.
CVE-2023-5377[0]:
| Out-of-bounds Read in GitHub
Your message dated Tue, 31 Oct 2023 18:04:51 +
with message-id
and subject line Bug#1042627: fixed in emscripten 3.1.6~dfsg-6
has caused the Debian Bug report #1042627,
regarding emscripten: FTBFS with Sphinx 7.1, docutils 0.20: make[1]: ***
[debian/rules:210:
Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Tue, 31 Oct 2023 18:47:21 +0100
Source: emscripten
Architecture: source
Version: 3.1.6~dfsg-6
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By:
emscripten_3.1.6~dfsg-6_source.changes uploaded successfully to localhost
along with the files:
emscripten_3.1.6~dfsg-6.dsc
emscripten_3.1.6~dfsg-6.debian.tar.xz
emscripten_3.1.6~dfsg-6_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
6 matches
Mail list logo