Afin de voir votre message, cliquez sur le lien:
http://link.news-sarouty.ma/v/443/de86ac2aa9610f178f48becabe74272d93b2665fc349b5b3
user debian-rele...@lists.debian.org
usertags -1 + bsp-2021-04-AT-Salzburg
owner !
thank you
pgpjD1UdtQFot.pgp
Description: OpenPGP digital signature
user debian-rele...@lists.debian.org
usertags -1 + bsp-2021-04-AT-Salzburg
owner !
thank you
pgpbvNQBSe0pX.pgp
Description: OpenPGP digital signature
Processing commands for cont...@bugs.debian.org:
> tags 986923 + pending
Bug #986923 [src:jhead] jhead: CVE-2021-3496
Added tag(s) pending.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
986923: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986923
Debian Bug
Processing commands for cont...@bugs.debian.org:
> tags 968999 + pending
Bug #968999 [jhead] jhead: Use-after-free in show_IPTC (jhead 3.04-3)
Added tag(s) pending.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
968999: https://bugs.debian.org/cgi-bin/bugreport.c
user debian-rele...@lists.debian.org
usertags -1 + bsp-2021-04-AT-Salzburg
owner !
thank you
pgpQ4bwM0T9ux.pgp
Description: OpenPGP digital signature
Processing commands for cont...@bugs.debian.org:
> tags 972617 + pending
Bug #972617 [jhead] heap-buffer-overflow on jhead-3.04/jpgfile.c:285
ReadJpegSections
Added tag(s) pending.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
972617: https://bugs.debian.org/cg
Your message dated Sat, 24 Apr 2021 13:18:31 +
with message-id
and subject line Bug#968999: fixed in jhead 1:3.04-6
has caused the Debian Bug report #968999,
regarding jhead: Use-after-free in show_IPTC (jhead 3.04-3)
to be marked as done.
This means that you claim that the problem has been d
Your message dated Sat, 24 Apr 2021 13:18:31 +
with message-id
and subject line Bug#972617: fixed in jhead 1:3.04-6
has caused the Debian Bug report #972617,
regarding heap-buffer-overflow on jhead-3.04/jpgfile.c:285 ReadJpegSections
to be marked as done.
This means that you claim that the pr
Your message dated Sat, 24 Apr 2021 13:18:31 +
with message-id
and subject line Bug#986923: fixed in jhead 1:3.04-6
has caused the Debian Bug report #986923,
regarding jhead: CVE-2021-3496
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the
jhead_3.04-6_source.changes uploaded successfully to localhost
along with the files:
jhead_3.04-6.dsc
jhead_3.04-6.debian.tar.xz
jhead_3.04-6_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 24 Apr 2021 14:59:38 +0200
Source: jhead
Architecture: source
Version: 1:3.04-6
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Stephen Kitt
Closes: 968999 972617 986923
Changes:
Processing commands for cont...@bugs.debian.org:
> found 972617 1:3.04-4
Bug #972617 {Done: Stephen Kitt } [jhead]
heap-buffer-overflow on jhead-3.04/jpgfile.c:285 ReadJpegSections
Marked as found in versions jhead/1:3.04-4.
> thanks
Stopping processing here.
Please contact me if you need assist
python-jenkinsapi_0.3.11-5_source.changes uploaded successfully to localhost
along with the files:
python-jenkinsapi_0.3.11-5.dsc
python-jenkinsapi_0.3.11-5.debian.tar.xz
python-jenkinsapi_0.3.11-5_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.or
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sat, 24 Apr 2021 23:29:27 +
Source: python-jenkinsapi
Architecture: source
Version: 0.3.11-5
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group
Changed-By: Chris Hofstaedtler
Closes: 986511
Change
15 matches
Mail list logo