Source: cimg
Version: 3.0.2+dfsg-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: codeh...@debian.org, Debian Security Team
Hi,
The following vulnerability was published for cimg.
CVE-2022-1325[0]:
| A flaw was found in Clmg, where with the help of a maliciously crafted
| pandore
On Mon, 1 Aug 2022 18:25:04 +0200 Sylvestre Ledru wrote:
> Hello,
>
> Le 05/07/2022 à 11:19, Neil Williams a écrit :
> > Source: scilab
> > Version: 6.1.1+dfsg2-3
> > Severity: important
> > Tags: security
> > X-Debbugs-Cc: codeh...@debian.org,
solete field Name from debian/upstream/metadata
> .
>[ Ole Streicher ]
>* Switch build depends on libnetpbm10-dev to libnetpbm-dev
> (Closes: #1003165)
1003165 is the wrong bug number and a different package. The B-D bug in
astrometry.net is 1016400.
https://bugs.debian.org
Source: scilab
Version: 6.1.1+dfsg2-3
Severity: important
Tags: security
X-Debbugs-Cc: codeh...@debian.org, Debian Security Team
Hi,
The following vulnerability was published for scilab.
CVE-2022-30045[0]:
| An issue was discovered in libezxml.a in ezXML 0.8.6. The function
| ezxml_decode()
eal-world usage of
cctbx was manageable on any current RISCV64 hardware.
> cctbx seems to build fine on riscv64 now. Can it be
> re-enabled?
Probably, yes. I won't have time to do an upload soon though.
If someone else has time to do it as a team upload, go ahead.
--
Neil Williams
li...@cod
Source: librecad
Version: 2.1.3-3
Severity: important
Tags: security
X-Debbugs-Cc: codeh...@debian.org, Debian Security Team
Hi,
The following vulnerability was published for librecad.
CVE-2021-21897[0]:
| A code execution vulnerability exists in the
| DL_Dxf::handleLWPolylineData
it may be necessary to retain the current patch method
and I don't see why that is against Policy. It's not pretty, I agree,
but I have not (yet) found an alternative.
--
Neil Williams
=
https://linux.codehelp.co.uk/
pgp9z_a7UMedA.pgp
Description: OpenPGP digital signature
--
debian-sc
Source: freecad
Version: 0.19.2+dfsg1-3
Severity: important
Tags: security
X-Debbugs-Cc: codeh...@debian.org, Debian Security Team
Hi,
The following vulnerability was published for freecad.
CVE-2021-45844[0]:
| Improper sanitization in the invocation of ODA File Converter from
| FreeCAD 0.19
Source: epics-base
Version: 7.0.3.1-3
Severity: important
X-Debbugs-Cc: codeh...@debian.org
Experimental Physics and Industrial Control System (EPICS) in Debian
relates to the epics-base source package and the pyepics work that will
result in new packages in Debian in due course.
Currently,
Source: scikit-learn
Version: 0.23.2-5
Severity: serious
Tags: ftbfs
Justification: Fails to build from source
X-Debbugs-Cc: codeh...@debian.org
The new version of scikit-learn has not migrated to testing because it
has not built on all required architectures. This is now affecting other
packages
this dependency for some reason.
What was the setup of this test build?
--
Neil Williams
=
http://www.linux.codehelp.co.uk/
pgprDszsn3oVy.pgp
Description: OpenPGP digital signature
--
debian-science-maintainers mailing list
debian-science-maintainers@alioth-lists.debian.net
https://alioth
A new upload of navarp 1.0.0-1 will be made.
--
Neil Williams
=
https://linux.codehelp.co.uk/
pgppPxCzDUs4W.pgp
Description: OpenPGP digital signature
--
debian-science-maintainers mailing list
debian-science-maintainers@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/
ixed upstream:
https://github.com/nltk/nltk/commit/277711ab1dec729e626b27aab6fa35ea5efbd7e6
https://github.com/nltk/nltk/pull/2816
Current vulnerable version in unstable:
https://sources.debian.org/src/nltk/3.5-1/nltk/corpus/reader/comparative_sents.py/#L48
--
Neil Williams
=
h
13 matches
Mail list logo