Package: inkscape
Version: 0.92.3-5+b1
Severity: normal
Dear Maintainer,
The current Debian package is affected by the annoying bug described at:
https://bugs.launchpad.net/inkscape/+bug/1522085
I attached a patch to that bug report.
(I contributed to the Ubuntu bug as it's referenced at upstrea
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 22 Oct 2018 09:46:13 +0100
Source: libopenmpt
Binary: openmpt123 libopenmpt0 libopenmpt-dev libopenmpt-doc
libopenmpt-modplug1 libopenmpt-modplug-dev
Architecture: source
Version: 0.3.13-1
Distribution: unstable
Your message dated Mon, 22 Oct 2018 11:05:28 +
with message-id
and subject line Bug#911584: fixed in libopenmpt 0.3.13-1
has caused the Debian Bug report #911584,
regarding libopenmpt: out of bounds memory read in MED files
to be marked as done.
This means that you claim that the problem has
libopenmpt_0.3.13-1_source.changes uploaded successfully to localhost
along with the files:
libopenmpt_0.3.13-1.dsc
libopenmpt_0.3.13.orig.tar.gz
libopenmpt_0.3.13-1.debian.tar.xz
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Source: libopenmpt
Version: 0.2.7025~beta20.1-1
Severity: important
Tags: security upstream fixed-upstream
Hi,
Upstream 0.3.13 released a fix for an out of bound read in malformed MED
files. It affects stretch.
Announcement:
https://lib.openmpt.org/libopenmpt/2018/10/21/security-updates-0.3.13-0
5 matches
Mail list logo