Processing commands for cont...@bugs.debian.org:
> tags 1060692 + upstream
Bug #1060692 [src:libuev] libuev: CVE-2022-48620
Added tag(s) upstream.
> found 1060692 2.4.0-1.1
Bug #1060692 [src:libuev] libuev: CVE-2022-48620
Marked as found in versions libuev/2.4.0-1.1.
> forwarded 1060692
Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 06 Nov 2023 23:32:42 -0300
Source: python-memoize
Architecture: source
Version: 1.0.3-3
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By:
python-memoize_1.0.3-3_source.changes uploaded successfully to localhost
along with the files:
python-memoize_1.0.3-3.dsc
python-memoize_1.0.3.orig.tar.xz
python-memoize_1.0.3-3.debian.tar.xz
python-memoize_1.0.3-3_amd64.buildinfo
Greetings,
Your Debian queue daemon (running on
Source: gpac
X-Debbugs-CC: t...@security.debian.org
Severity: normal
Tags: security
Hi,
The following vulnerability was published for gpac.
CVE-2023-50120[0]:
| MP4Box GPAC version 2.3-DEV-rev636-gfbd7e13aa-master was discovered
| to contain an infinite loop in the function av1_uvlc at
|
4 matches
Mail list logo