Processing commands for cont...@bugs.debian.org: > severity 780565 grave Bug #780565 [capnproto] capnproto: CVE-2015-2310: Integer overflow in pointer validation Severity set to 'grave' from 'critical' > severity 780566 grave Bug #780566 [capnproto] capnproto: CVE-2015-2311: Integer underflow in pointer validation Severity set to 'grave' from 'critical' > severity 780567 grave Bug #780567 [capnproto] capnproto: CVE-2015-2312: CPU usage amplification attack Severity set to 'grave' from 'critical' > severity 780568 grave Bug #780568 [capnproto] capnproto: CVE-2015-2313: CPU usage amplification attack #2 Severity set to 'grave' from 'critical' > thanks Stopping processing here.
Please contact me if you need assistance. -- 780565: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780565 780566: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780566 780567: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780567 780568: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780568 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org