Bug#1036314: bullseye-pu: package mujs/1.1.0-1+deb11u3
- To: Bastian Germann <bage@debian.org>, 1036314@bugs.debian.org
- Subject: Bug#1036314: bullseye-pu: package mujs/1.1.0-1+deb11u3
- From: Jonathan Wiltshire <jmw@debian.org>
- Date: Tue, 27 Jun 2023 20:56:21 +0100
- Message-id: <ZJs+5ewSrZ8c/Lgx@powdarrmonkey.net>
- Reply-to: Jonathan Wiltshire <jmw@debian.org>, 1036314@bugs.debian.org
- In-reply-to: <e7aab222-29d0-f18f-7a8b-52a16c791c77@debian.org>
- References: <e7aab222-29d0-f18f-7a8b-52a16c791c77@debian.org> <e7aab222-29d0-f18f-7a8b-52a16c791c77@debian.org>
Control: tag -1 confirmed
On Fri, May 19, 2023 at 10:58:10AM +0200, Bastian Germann wrote:
> [ Reason ]
> https://security-tracker.debian.org/tracker/CVE-2021-33797
> Buffer-overflow via integer overflow.
A bug number in the changelog would be nice if there is one, but go ahead
either way.
Thanks,
--
Jonathan Wiltshire jmw@debian.org
Debian Developer http://people.debian.org/~jmw
4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC 74C3 5394 479D D352 4C51
ed25519/0x196418AAEB74C8A1: CA619D65A72A7BADFC96D280196418AAEB74C8A1
Reply to: