libytnef_1.9.2-2_amd64.changes uploaded successfully to localhost
along with the files:
libytnef_1.9.2-2.dsc
libytnef_1.9.2-2.debian.tar.xz
libytnef0-dbgsym_1.9.2-2_amd64.deb
libytnef0-dev_1.9.2-2_amd64.deb
libytnef0_1.9.2-2_amd64.deb
libytnef_1.9.2-2_amd64.buildinfo
ytnef-tools-dbgsy
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 22 May 2017 23:51:52 +0200
Source: libytnef
Binary: libytnef0 libytnef0-dev ytnef-tools
Architecture: source amd64
Version: 1.9.2-2
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Jo
Your message dated Wed, 24 May 2017 09:05:44 +
with message-id
and subject line Bug#862556: fixed in libytnef 1.9.2-2
has caused the Debian Bug report #862556,
regarding CVE-2017-9058: Heap-based buffer overflow due to incorrect boundary
checking
to be marked as done.
This means that you cla
Processing control commands:
> block -1 by 860523 810158 759410 837928
Bug #863269 [usrmerge] usrmerge is not yet ready for a stable release
863269 was not blocked by any bugs.
863269 was not blocking any bugs.
Added blocking bug(s) of 863269: 837928, 860523, 759410, and 810158
--
863269: http:/
4 matches
Mail list logo