Processing commands for cont...@bugs.debian.org: > tags 1027144 + upstream Bug #1027144 [src:radare2] radare2: CVE-2022-4398 Added tag(s) upstream. > tags 1027145 + upstream Bug #1027145 [src:node-json5] node-json5: CVE-2022-46175 Added tag(s) upstream. > forwarded 1027145 https://github.com/json5/json5/issues/199 Bug #1027145 [src:node-json5] node-json5: CVE-2022-46175 Set Bug forwarded-to-address to 'https://github.com/json5/json5/issues/199'. > tags 1027143 + upstream Bug #1027143 [src:openimageio] openimageio: CVE-2022-43592 CVE-2022-43593 CVE-2022-43594 CVE-2022-43595 CVE-2022-43596 CVE-2022-43597 CVE-2022-43598 CVE-2022-43599 CVE-2022-43600 CVE-2022-43601 CVE-2022-43602 CVE-2022-41639 CVE-2022-41649 CVE-2022-41684 CVE-2022-41794 CVE-2022-41837 CVE-2022-41838 CVE-2022-41977 CVE-2022-41981 CVE-2022-41988 Added tag(s) upstream. > tags 1027146 + upstream Bug #1027146 {Done: James McCoy <james...@debian.org>} [src:vim] vim: CVE-2022-4141 Added tag(s) upstream. > found 1027146 2:9.0.0813-1 Bug #1027146 {Done: James McCoy <james...@debian.org>} [src:vim] vim: CVE-2022-4141 Marked as found in versions vim/2:9.0.0813-1. > tags 1027149 + upstream Bug #1027149 [src:jython] jython: CVE-2019-16935 Added tag(s) upstream. > tags 1027151 + upstream Bug #1027151 [src:ceph] ceph: CVE-2022-3854 Added tag(s) upstream. > forwarded 1027151 https://tracker.ceph.com/issues/55765 Bug #1027151 [src:ceph] ceph: CVE-2022-3854 Set Bug forwarded-to-address to 'https://tracker.ceph.com/issues/55765'. > tags 1027150 + upstream Bug #1027150 [src:neutron] neutron: CVE-2022-3277 Added tag(s) upstream. > tags 1027154 + upstream Bug #1027154 [src:puppet-module-puppetlabs-mysql] puppet-module-puppetlabs-mysql: CVE-2022-3276 Added tag(s) upstream. > tags 1027153 + upstream Bug #1027153 [src:ruby-rails-html-sanitizer] ruby-rails-html-sanitizer: CVE-2022-23517 CVE-2022-23518 CVE-2022-23519 CVE-2022-23520 Added tag(s) upstream. > tags 1027160 + upstream Bug #1027160 [src:xdg-utils] xdg-utils: CVE-2022-4055 Added tag(s) upstream. > tags 1027161 + upstream Bug #1027161 [src:consul] consul: CVE-2022-40716 Bug #1027162 [src:consul] consul: CVE-2022-40716 Added tag(s) upstream. Added tag(s) upstream. > tags 1027163 + upstream Bug #1027163 [src:python-git] python-git: CVE-2022-24439 Added tag(s) upstream. > thanks Stopping processing here.
Please contact me if you need assistance. -- 1027143: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027143 1027144: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027144 1027145: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027145 1027146: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027146 1027149: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027149 1027150: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027150 1027151: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027151 1027153: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027153 1027154: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027154 1027160: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027160 1027161: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027161 1027162: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027162 1027163: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027163 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- Pkg-javascript-devel mailing list Pkg-javascript-devel@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-javascript-devel