Processed: bug 981370 is forwarded to https://dev.gnupg.org/T5275, tagging 981370

Debian Bug Tracking System owner at bugs.debian.org
Sat Jan 30 10:21:09 GMT 2021


Processing commands for control at bugs.debian.org:

> forwarded 981370 https://dev.gnupg.org/T5275
Bug #981370 [libgcrypt20] libgcrypt20: CVE-2021-3345: Exploitable heap-based buffer overflow (Only relevant for Debian/experimental)
Bug #981336 [libgcrypt20] libgcrypt20: CVE-2021-3345: Exploitable heap-based buffer overflow (Only relevant for Debian/experimental)
Set Bug forwarded-to-address to 'https://dev.gnupg.org/T5275'.
Set Bug forwarded-to-address to 'https://dev.gnupg.org/T5275'.
> tags 981370 + security upstream fixed-upstream
Bug #981370 [libgcrypt20] libgcrypt20: CVE-2021-3345: Exploitable heap-based buffer overflow (Only relevant for Debian/experimental)
Bug #981336 [libgcrypt20] libgcrypt20: CVE-2021-3345: Exploitable heap-based buffer overflow (Only relevant for Debian/experimental)
Ignoring request to alter tags of bug #981370 to the same tags previously set
Ignoring request to alter tags of bug #981336 to the same tags previously set
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
981336: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981336
981370: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981370
Debian Bug Tracking System
Contact owner at bugs.debian.org with problems



More information about the Pkg-gnutls-maint mailing list