Processed: Re: Bug#981370: CVE - critical security bug - Exploitable overflow in Libgcrypt 1.9.0

Debian Bug Tracking System owner at bugs.debian.org
Sat Jan 30 10:15:06 GMT 2021


Processing control commands:

> forcemerge 981336 981370
Bug #981336 [libgcrypt20] libgcrypt20: Version 1.9.0 (Debian experimental) know to be broken
Bug #981370 [libgcrypt20] libgcrypt20: CVE-2021-3345: Exploitable heap-based buffer overflow
Unset Bug forwarded-to-address
Severity set to 'serious' from 'important'
Bug #981336 [libgcrypt20] libgcrypt20: Version 1.9.0 (Debian experimental) know to be broken
Added tag(s) security and fixed-upstream.
Merged 981336 981370
> retitle 981336 libgcrypt20: CVE-2021-3345: Exploitable heap-based buffer overflow (Only relevant for Debian/experimental)
Bug #981336 [libgcrypt20] libgcrypt20: Version 1.9.0 (Debian experimental) know to be broken
Bug #981370 [libgcrypt20] libgcrypt20: CVE-2021-3345: Exploitable heap-based buffer overflow
Changed Bug title to 'libgcrypt20: CVE-2021-3345: Exploitable heap-based buffer overflow (Only relevant for Debian/experimental)' from 'libgcrypt20: Version 1.9.0 (Debian experimental) know to be broken'.
Changed Bug title to 'libgcrypt20: CVE-2021-3345: Exploitable heap-based buffer overflow (Only relevant for Debian/experimental)' from 'libgcrypt20: CVE-2021-3345: Exploitable heap-based buffer overflow'.

-- 
981336: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981336
981370: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981370
Debian Bug Tracking System
Contact owner at bugs.debian.org with problems



More information about the Pkg-gnutls-maint mailing list