Hi Bill,
Thanks for your quick answer.
My bug entry was just to inform you =)
Regards,
Wil
From: Bill Allombert [ballo...@debian.org]
Sent: Friday, November 29, 2019 4:47 PM
To: PASCAULT Wilfried OBS/OCD; 945...@bugs.debian.org
Subject: Re: Bug#945839:
Package: pari
Version: 2.11.1-2
Georgi Guninski disclosed on Nov 26 a vulnerability on Full Disclosure [1].
He's saying that pari/gp packages are vulnerable to an arbitrary code execution
; and mainstream package versions are vulnerable on Stretch and Buster.
On DST pari/gp page [2] ; there is
2 matches
Mail list logo