Hi Tom,
On Tue, Apr 25, 2017 at 12:12:11AM -0700, Tom Lee wrote:
> Salvatore,
>
> Assuming you raised this on behalf of the security team (and per
> https://www.debian.org/intro/organization#security I'm assuming you are):
>
> For a moment I thought it might be worth applying upstream's patch
Salvatore,
Assuming you raised this on behalf of the security team (and per
https://www.debian.org/intro/organization#security I'm assuming you are):
For a moment I thought it might be worth applying upstream's patch as a
precaution & requesting an unblock, but it really seems like it's just a
Thanks for the reminder Salvatore -- I'll get this sorted out.
On Sat, Apr 22, 2017 at 10:43 AM, Salvatore Bonaccorso
wrote:
> Source: capnproto
> Version: 0.5.3-2
> Severity: minor
> Tags: upstream security fixed-upstream
>
> Hi,
>
> the following vulnerability was published
Source: capnproto
Version: 0.5.3-2
Severity: minor
Tags: upstream security fixed-upstream
Hi,
the following vulnerability was published for capnproto.
CVE-2017-7892[0]:
| Sandstorm Cap'n Proto before 0.5.3.1 allows remote crashes related to a
| compiler optimization. A remote attacker can
4 matches
Mail list logo