Processed: tagging 981370, found 981370 in 1.9.0-1, bug 981370 is forwarded to https://dev.gnupg.org/T5275 ...

Debian Bug Tracking System owner at bugs.debian.org
Sat Jan 30 08:03:04 GMT 2021


Processing commands for control at bugs.debian.org:

> tags 981370 + security upstream fixed-upstream
Bug #981370 [libgcrypt20] CVE - critical security bug - Exploitable overflow in Libgcrypt 1.9.0
Added tag(s) fixed-upstream, upstream, and security.
> found 981370 1.9.0-1
Bug #981370 [libgcrypt20] CVE - critical security bug - Exploitable overflow in Libgcrypt 1.9.0
Marked as found in versions libgcrypt20/1.9.0-1.
> forwarded 981370 https://dev.gnupg.org/T5275
Bug #981370 [libgcrypt20] CVE - critical security bug - Exploitable overflow in Libgcrypt 1.9.0
Set Bug forwarded-to-address to 'https://dev.gnupg.org/T5275'.
> retitle 981370 libgcrypt20: CVE-2021-3345: Exploitable heap-based buffer overflow
Bug #981370 [libgcrypt20] CVE - critical security bug - Exploitable overflow in Libgcrypt 1.9.0
Changed Bug title to 'libgcrypt20: CVE-2021-3345: Exploitable heap-based buffer overflow' from 'CVE - critical security bug - Exploitable overflow in Libgcrypt 1.9.0'.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
981370: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981370
Debian Bug Tracking System
Contact owner at bugs.debian.org with problems



More information about the Pkg-gnutls-maint mailing list