Your message dated Sat, 26 Sep 2020 11:36:30 +0100 with message-id <d50ba4de424290cd2840a09ef19950156fcf51ab.camel@adam-barratt.org.uk> and subject line Closing bugs for fixes included in 10.6 point release has caused the Debian Bug report #969190, regarding buster-pu: package libvncserver/0.9.11+dfsg-1.3+deb10u4 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 969190: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969190 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: buster-pu: package libvncserver/0.9.11+dfsg-1.3+deb10u3
- From: Mike Gabriel <sunweaver@debian.org>
- Date: Fri, 28 Aug 2020 23:55:13 +0200
- Message-id: <159865171303.1250.16071642626924924674.reportbug@minobo.das-netzwerkteam.de>
Package: release.debian.org Severity: normal Tags: buster User: release.debian.org@packages.debian.org Usertags: pu Dear release team, several (minor) CVE issues have been resolved in buster's libvncserver: + * CVE-2019-20839: libvncclient: bail out if unix socket name would overflow. + * CVE-2020-14397: libvncserver: add missing NULL pointer checks. + * CVE-2020-14399: libvncclient: fix pointer aliasing/alignment issue. + * CVE-2020-14400: libvncserver: fix pointer aliasing/alignment issue. + * CVE-2020-14401: libvncserver: scale: cast to 64 bit before shifting. + * CVE-2020-14402, CVE-2020-14403, CVE-2020-14404: libvncserver: encodings: + prevent OOB accesses. + * CVE-2020-14405: libvncclient/rfbproto: limit max textchat size. The changes have already been dput as +deb10u4. Thanks for reviewing. Greets, Mike -- System Information: Debian Release: 10.5 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'proposed-updates'), (500, 'stable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.19.0-10-amd64 (SMP w/4 CPU cores) Kernel taint flags: TAINT_WARN, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled
--- End Message ---
--- Begin Message ---
- To: 947464-done@bugs.debian.org, 949826-done@bugs.debian.org, 953614-done@bugs.debian.org, 961843-done@bugs.debian.org, 965334-done@bugs.debian.org, 967995-done@bugs.debian.org, 967996-done@bugs.debian.org, 968037-done@bugs.debian.org, 968296-done@bugs.debian.org, 968502-done@bugs.debian.org, 968515-done@bugs.debian.org, 968548-done@bugs.debian.org, 968723-done@bugs.debian.org, 968846-done@bugs.debian.org, 969066-done@bugs.debian.org, 969163-done@bugs.debian.org, 969172-done@bugs.debian.org, 969190-done@bugs.debian.org, 969272-done@bugs.debian.org, 969348-done@bugs.debian.org, 969349-done@bugs.debian.org, 969366-done@bugs.debian.org, 969369-done@bugs.debian.org, 969706-done@bugs.debian.org, 969912-done@bugs.debian.org, 970096-done@bugs.debian.org, 970098-done@bugs.debian.org, 970132-done@bugs.debian.org, 970239-done@bugs.debian.org, 970241-done@bugs.debian.org, 970296-done@bugs.debian.org, 970307-done@bugs.debian.org, 970311-done@bugs.debian.org, 970349-done@bugs.debian.org, 970387-done@bugs.debian.org, 970424-done@bugs.debian.org, 970427-done@bugs.debian.org, 970549-done@bugs.debian.org, 970563-done@bugs.debian.org, 970564-done@bugs.debian.org, 970569-done@bugs.debian.org, 970583-done@bugs.debian.org, 970584-done@bugs.debian.org
- Subject: Closing bugs for fixes included in 10.6 point release
- From: "Adam D. Barratt" <adam@adam-barratt.org.uk>
- Date: Sat, 26 Sep 2020 11:36:30 +0100
- Message-id: <d50ba4de424290cd2840a09ef19950156fcf51ab.camel@adam-barratt.org.uk>
Package: release.debian.org Version: 10.6 Hi, Each of these bugs relates to an update that was included in today's stable point release. Regards, Adam
--- End Message ---