Processed: tagging 1060692, found 1060692 in 2.4.0-1.1 ..., tagging 1060691, tagging 1060693, tagging 1060694 ...

2024-01-12 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 1060692 + upstream Bug #1060692 [src:libuev] libuev: CVE-2022-48620 Added tag(s) upstream. > found 1060692 2.4.0-1.1 Bug #1060692 [src:libuev] libuev: CVE-2022-48620 Marked as found in versions libuev/2.4.0-1.1. > forwarded 1060692

python-memoize_1.0.3-3_source.changes ACCEPTED into unstable

2024-01-12 Thread Debian FTP Masters
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Mon, 06 Nov 2023 23:32:42 -0300 Source: python-memoize Architecture: source Version: 1.0.3-3 Distribution: unstable Urgency: medium Maintainer: Debian QA Group Changed-By:

Processing of python-memoize_1.0.3-3_source.changes

2024-01-12 Thread Debian FTP Masters
python-memoize_1.0.3-3_source.changes uploaded successfully to localhost along with the files: python-memoize_1.0.3-3.dsc python-memoize_1.0.3.orig.tar.xz python-memoize_1.0.3-3.debian.tar.xz python-memoize_1.0.3-3_amd64.buildinfo Greetings, Your Debian queue daemon (running on

Bug#1060696: gpac: CVE-2023-50120

2024-01-12 Thread Moritz Mühlenhoff
Source: gpac X-Debbugs-CC: t...@security.debian.org Severity: normal Tags: security Hi, The following vulnerability was published for gpac. CVE-2023-50120[0]: | MP4Box GPAC version 2.3-DEV-rev636-gfbd7e13aa-master was discovered | to contain an infinite loop in the function av1_uvlc at |