Mapping stable-security to proposed-updates.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Thu, 07 Dec 2017 21:42:04 +0100
Source: optipng
Binary: optipng
Architecture: source
Version: 0.7.6-1+deb9u1
Distribution: stretch-security
Urgency: high
Maintainer: Debian
Mapping oldstable-security to oldstable-proposed-updates.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Thu, 07 Dec 2017 21:47:21 +0100
Source: optipng
Binary: optipng
Architecture: source
Version: 0.7.5-1+deb8u2
Distribution: jessie-security
Urgency: high
Processing commands for cont...@bugs.debian.org:
> retitle 878839 optipng: CVE-2017-16938: global-buffer-overflow bug while
> parsing GIF file
Bug #878839 {Done: Salvatore Bonaccorso } [optipng] optipng:
global-buffer-overflow bug while parsing GIF file
Changed Bug title to
Your message dated Fri, 08 Dec 2017 16:49:16 +
with message-id
and subject line Bug#882032: fixed in optipng 0.7.6-1.1
has caused the Debian Bug report #882032,
regarding optipng: CVE-2017-1000229: Integer Overflow Bug while parsing TIFF
input file
to be
Your message dated Fri, 08 Dec 2017 16:49:16 +
with message-id
and subject line Bug#878839: fixed in optipng 0.7.6-1.1
has caused the Debian Bug report #878839,
regarding optipng: global-buffer-overflow bug while parsing GIF file
to be marked as done.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Thu, 07 Dec 2017 20:43:29 +0100
Source: optipng
Binary: optipng
Architecture: source
Version: 0.7.6-1.1
Distribution: unstable
Urgency: medium
Maintainer: Debian PhotoTools Maintainers
Hi Emmanuel
I perfectly realize it's not conforming to the NMU rules, so if that
made you unhappy I apologies for it. I moved the optipng upload from
delayed/5 to delayed/0 since was planing a security update, and the
point release happening this weekend would imply stretch-version <
sid-version.