Processing commands for cont...@bugs.debian.org: > tags 981370 + security upstream fixed-upstream Bug #981370 [libgcrypt20] CVE - critical security bug - Exploitable overflow in Libgcrypt 1.9.0 Added tag(s) fixed-upstream, upstream, and security. > found 981370 1.9.0-1 Bug #981370 [libgcrypt20] CVE - critical security bug - Exploitable overflow in Libgcrypt 1.9.0 Marked as found in versions libgcrypt20/1.9.0-1. > forwarded 981370 https://dev.gnupg.org/T5275 Bug #981370 [libgcrypt20] CVE - critical security bug - Exploitable overflow in Libgcrypt 1.9.0 Set Bug forwarded-to-address to 'https://dev.gnupg.org/T5275'. > retitle 981370 libgcrypt20: CVE-2021-3345: Exploitable heap-based buffer > overflow Bug #981370 [libgcrypt20] CVE - critical security bug - Exploitable overflow in Libgcrypt 1.9.0 Changed Bug title to 'libgcrypt20: CVE-2021-3345: Exploitable heap-based buffer overflow' from 'CVE - critical security bug - Exploitable overflow in Libgcrypt 1.9.0'. > thanks Stopping processing here.
Please contact me if you need assistance. -- 981370: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981370 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems