Processing commands for cont...@bugs.debian.org: > found 1030050 2:6.1.7+dfsg-3 Bug #1030050 [src:rails] rails: CVE-2023-22796 CVE-2023-22795 CVE-2023-22794 CVE-2023-22792 CVE-2022-44566 Marked as found in versions rails/2:6.1.7+dfsg-3. > tags 1030050 + upstream Bug #1030050 [src:rails] rails: CVE-2023-22796 CVE-2023-22795 CVE-2023-22794 CVE-2023-22792 CVE-2022-44566 Added tag(s) upstream. > tags 1030049 + upstream Bug #1030049 [src:opusfile] opusfile: CVE-2022-47021 Added tag(s) upstream. > forwarded 1030049 https://github.com/xiph/opusfile/issues/36 Bug #1030049 [src:opusfile] opusfile: CVE-2022-47021 Set Bug forwarded-to-address to 'https://github.com/xiph/opusfile/issues/36'. > found 1030049 0.12-3 Bug #1030049 [src:opusfile] opusfile: CVE-2022-47021 Marked as found in versions opusfile/0.12-3. > tags 1030048 + upstream Bug #1030048 [src:pgpool2] pgpool2: CVE-2023-22332 Added tag(s) upstream. > found 1030048 4.3.3-3 Bug #1030048 [src:pgpool2] pgpool2: CVE-2023-22332 Marked as found in versions pgpool2/4.3.3-3. > found 1030048 4.1.4-3 Bug #1030048 [src:pgpool2] pgpool2: CVE-2023-22332 Marked as found in versions pgpool2/4.1.4-3. > tags 1030047 + upstream Bug #1030047 [src:ruby-sanitize] ruby-sanitize: CVE-2023-23627 Added tag(s) upstream. > found 1030047 6.0.0-1 Bug #1030047 [src:ruby-sanitize] ruby-sanitize: CVE-2023-23627 Marked as found in versions ruby-sanitize/6.0.0-1. > found 1030047 5.2.1-2 Bug #1030047 [src:ruby-sanitize] ruby-sanitize: CVE-2023-23627 Marked as found in versions ruby-sanitize/5.2.1-2. > thanks Stopping processing here.
Please contact me if you need assistance. -- 1030047: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030047 1030048: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030048 1030049: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030049 1030050: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030050 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems