Source: hdf5
Version: 1.8.13+docs-1
Severity: important
Tags: security upstream
Hi,
the following vulnerabilities were published for hdf5, the POCs are
found at [5]. Apart of CVE-2017-17509, all are confirmed back to
1.8.13+decs-15+deb8u1, still decided to collect that CVE as well in
this bug,
Hi Bas,
On Sun, Sep 17, 2017 at 12:01:53AM +0200, Sebastiaan Couwenberg wrote:
> Hi Salvatore,
>
> On 09/13/2017 07:27 PM, Bas Couwenberg wrote:
> > Should be fixed in the new upstream release:
> >
> > https://groups.google.com/forum/m/#!topic/spatialite-users/Wpj62XSzcZY
> >
> > I'm not able
Source: hdf5
Version: 1.8.16+docs-8
Severity: grave
Tags: security upstream
Justification: user security hole
Hi,
the following vulnerabilities were published for hdf5.
CVE-2016-4330[0]:
| In the HDF5 1.8.16 library's failure to check if the number of
| dimensions for an array read from the
Hi Sebastiaan,
On Wed, Jan 08, 2014 at 11:15:56PM +0100, Sebastiaan Couwenberg wrote:
Hi Salvatore,
On 01/08/2014 10:09 AM, Salvatore Bonaccorso wrote:
On Wed, Jan 08, 2014 at 08:40:35AM +0100, Sebastiaan Couwenberg wrote:
On 01/08/2014 08:25 AM, Salvatore Bonaccorso wrote:
If you fix
Package: hdf5
Version: 1.6.6-4
Severity: wishlist
Hi
There seems to be a new upstream version of hdf5 (1.8.2). Would it be
possible to package the new version?
Kind regards
Salvatore
-- System Information:
Debian Release: squeeze/sid
APT prefers unstable
APT policy: (500, 'unstable')
Hi
I ran into the same problem as #515579 when packaging udav. Are there
any news on that?
Kind regards
Salvatore
signature.asc
Description: Digital signature
___
Pkg-grass-devel mailing list
Pkg-grass-devel@lists.alioth.debian.org
6 matches
Mail list logo