Accepted gerbv 2.7.0-1+deb10u2 (source amd64) into oldstable
- To: dispatch@tracker.debian.org, debian-lts-changes@lists.debian.org
- Subject: Accepted gerbv 2.7.0-1+deb10u2 (source amd64) into oldstable
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Mon, 28 Nov 2022 11:30:23 +0000
- Debian: DAK
- Debian-architecture: source amd64
- Debian-archive-action: accept
- Debian-changes: gerbv_2.7.0-1+deb10u2_amd64.changes
- Debian-source: gerbv
- Debian-suite: oldstable
- Debian-version: 2.7.0-1+deb10u2
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ftp-master.debian.org; s=smtpauto.seger; h=Date:Message-Id: Content-Transfer-Encoding:Content-Type:Subject:MIME-Version:To:Reply-To:From: Cc:Content-ID:Content-Description:In-Reply-To:References; bh=coGvr1WT1e4txhoZyWVcQ3w6VsE2pvtis9XT7ZQ7Ysg=; b=BQZyrpmjSeR/NHQV9ZYlfrkme9 wHUNgmatJzvC/IEbgMczSXYu8/TgVHZVsUDcKg/DAwUzZsG/n0qdTybXT4kSlfLirB7fmJ1wVLWYZ v0l+TRNIyePDGji0wZ0L0VVlNYOcfE8BhJjYZjaYIs9EggE6ELPnDx53aHCQiJymyZQpaMHD/ELlN BYSnRsOgmcjTAvDZ4OyV75dUTNf1CMh4KvqGs47k4A5klunb9Gs970zO+A5+SCywuSuNlRvfEHiq9 7hBtshbrC9R6rqgtr5+PmZNLsPyBHz6CLVIaqucInCrUZcMAdr6U9z4bB6dfsD0Yj/0KHuMXts3xp VvK6kIMg==;
- Mail-followup-to: debian-lts@lists.debian.org
- Message-id: <E1ozcL9-006rcs-NB@seger.debian.org>
- Reply-to: debian-lts@lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Mon, 28 Nov 2022 11:08:30 +0000
Source: gerbv
Binary: gerbv gerbv-dbgsym
Architecture: source amd64
Version: 2.7.0-1+deb10u2
Distribution: buster-security
Urgency: high
Maintainer: Debian Electronics Team <pkg-electronics-devel@alioth-lists.debian.net>
Changed-By: Chris Lamb <lamby@debian.org>
Description:
gerbv - Gerber file viewer (only RS 274 X format)
Changes:
gerbv (2.7.0-1+deb10u2) buster-security; urgency=high
.
* Non-maintainer upload by the Debian LTS team:
.
- CVE-2021-40401: A use-after-free vulnerability existed in the RS-274X
aperture definition tokenization functionality. A specially-crafted
gerber file could have lead to code execution.
.
- CVE-2021-40403: An information disclosure vulnerability existed in the
pick-and-place rotation parsing functionality. A specially-crafted
pick-and-place file can exploit the missing initialization of a structure
in order to leak memory contents.
.
* Add debian/.gitlab-ci.yml.
Checksums-Sha1:
0a1459dd9965af1a5e65824bea501bbb563508fb 2045 gerbv_2.7.0-1+deb10u2.dsc
1e39330f247bf2f6f1f790dfce12d7c59175e531 5269869 gerbv_2.7.0.orig.tar.gz
004ab40a912739fd012c1f3e5da6dc4f09727f4e 20876 gerbv_2.7.0-1+deb10u2.debian.tar.xz
228f2030a8811473ecb0ba74e56c42176c7b1ab8 424132 gerbv-dbgsym_2.7.0-1+deb10u2_amd64.deb
c858e9ac8bad1af6a938a7a024d957507125aa51 11215 gerbv_2.7.0-1+deb10u2_amd64.buildinfo
662de5da1ea69792c8ea49a32a5e94b8a210ebd3 1747856 gerbv_2.7.0-1+deb10u2_amd64.deb
Checksums-Sha256:
6e6c1ef7549d4db4ba2bece4e5dd99de1319b2b952b81703e2b99dfd97d07444 2045 gerbv_2.7.0-1+deb10u2.dsc
5f33d48cce45004986a99c8b05d1f85f533a9775353228c02844beb764cde3bb 5269869 gerbv_2.7.0.orig.tar.gz
248c5bc71e82e6ec0235ea2b278641ca520417657fc4e33315c3f6cc457f818e 20876 gerbv_2.7.0-1+deb10u2.debian.tar.xz
7cd6c21ff7fd1fd6db842a4bf3c67efd5b9367b861f67b51036b065c82921249 424132 gerbv-dbgsym_2.7.0-1+deb10u2_amd64.deb
ced7ddc0bbd589d24f2e84466d262c9eee54cc038f58a93ed951d8ce2b6968a9 11215 gerbv_2.7.0-1+deb10u2_amd64.buildinfo
f4a7493283042150b661506500fee9c3eacf3f67f25a03191b913ef415acf407 1747856 gerbv_2.7.0-1+deb10u2_amd64.deb
Files:
3d282bf0574abc31dfa9f733e7876bb3 2045 electronics optional gerbv_2.7.0-1+deb10u2.dsc
1409c7fd027dea3f56e2a7a6bee599bf 5269869 electronics optional gerbv_2.7.0.orig.tar.gz
90e69af91d1a503784fb5da93a969260 20876 electronics optional gerbv_2.7.0-1+deb10u2.debian.tar.xz
21d64c56143052fa8f140bf07cf5c8b9 424132 debug optional gerbv-dbgsym_2.7.0-1+deb10u2_amd64.deb
627e7f085ddb6beac3c7e5fd3b0859b3 11215 electronics optional gerbv_2.7.0-1+deb10u2_amd64.buildinfo
4a108e0e3a7aeb400dd7bec9ea147bf3 1747856 electronics optional gerbv_2.7.0-1+deb10u2_amd64.deb
-----BEGIN PGP SIGNATURE-----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=pbsY
-----END PGP SIGNATURE-----