Processing control commands:

> clone -1 -2
Bug #857560 [libmbedcrypto0] mbedtls: CVE-2017-2748 - Freeing of memory 
allocated on stack when validating a public key with a secp224k1 curve
Bug 857560 cloned as bug 857561
> reassign -2 libpolarssl7 1.3.9-2.1+deb8u1
Bug #857561 [libmbedcrypto0] mbedtls: CVE-2017-2748 - Freeing of memory 
allocated on stack when validating a public key with a secp224k1 curve
Bug reassigned from package 'libmbedcrypto0' to 'libpolarssl7'.
No longer marked as found in versions mbedtls/2.4.0-1.
Ignoring request to alter fixed versions of bug #857561 to the same values 
previously set
Bug #857561 [libpolarssl7] mbedtls: CVE-2017-2748 - Freeing of memory allocated 
on stack when validating a public key with a secp224k1 curve
Marked as found in versions polarssl/1.3.9-2.1+deb8u1.
> retitle -2 polarssl: CVE-2017-2748 - Freeing of memory allocated on stack 
> when validating a public key with a secp224k1 curve
Bug #857561 [libpolarssl7] mbedtls: CVE-2017-2748 - Freeing of memory allocated 
on stack when validating a public key with a secp224k1 curve
Changed Bug title to 'polarssl: CVE-2017-2748 - Freeing of memory allocated on 
stack when validating a public key with a secp224k1 curve' from 'mbedtls: 
CVE-2017-2748 - Freeing of memory allocated on stack when validating a public 
key with a secp224k1 curve'.

-- 
857560: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857560
857561: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857561
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems

Reply via email to