Processing commands for cont...@bugs.debian.org:

> tags 981370 + security upstream fixed-upstream
Bug #981370 [libgcrypt20] CVE - critical security bug - Exploitable overflow in 
Libgcrypt 1.9.0
Added tag(s) fixed-upstream, upstream, and security.
> found 981370 1.9.0-1
Bug #981370 [libgcrypt20] CVE - critical security bug - Exploitable overflow in 
Libgcrypt 1.9.0
Marked as found in versions libgcrypt20/1.9.0-1.
> forwarded 981370 https://dev.gnupg.org/T5275
Bug #981370 [libgcrypt20] CVE - critical security bug - Exploitable overflow in 
Libgcrypt 1.9.0
Set Bug forwarded-to-address to 'https://dev.gnupg.org/T5275'.
> retitle 981370 libgcrypt20: CVE-2021-3345: Exploitable heap-based buffer 
> overflow
Bug #981370 [libgcrypt20] CVE - critical security bug - Exploitable overflow in 
Libgcrypt 1.9.0
Changed Bug title to 'libgcrypt20: CVE-2021-3345: Exploitable heap-based buffer 
overflow' from 'CVE - critical security bug - Exploitable overflow in Libgcrypt 
1.9.0'.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
981370: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981370
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems

Reply via email to