Processing commands for cont...@bugs.debian.org:

> severity 780565 grave
Bug #780565 [capnproto] capnproto: CVE-2015-2310: Integer overflow in pointer 
validation
Severity set to 'grave' from 'critical'
> severity 780566 grave
Bug #780566 [capnproto] capnproto: CVE-2015-2311: Integer underflow in pointer 
validation
Severity set to 'grave' from 'critical'
> severity 780567 grave
Bug #780567 [capnproto] capnproto: CVE-2015-2312: CPU usage amplification attack
Severity set to 'grave' from 'critical'
> severity 780568 grave
Bug #780568 [capnproto] capnproto: CVE-2015-2313: CPU usage amplification 
attack #2
Severity set to 'grave' from 'critical'
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
780565: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780565
780566: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780566
780567: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780567
780568: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780568
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to