Accepted frr 7.5.1-1.1+deb10u1 (source) into oldoldstable
- To: debian-lts-changes@lists.debian.org, dispatch@tracker.debian.org
- Subject: Accepted frr 7.5.1-1.1+deb10u1 (source) into oldoldstable
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Tue, 19 Sep 2023 18:50:23 +0000
- Debian: DAK
- Debian-architecture: source
- Debian-archive-action: accept
- Debian-changes: frr_7.5.1-1.1+deb10u1_source.changes
- Debian-source: frr
- Debian-suite: oldoldstable
- Debian-version: 7.5.1-1.1+deb10u1
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ftp-master.debian.org; s=smtpauto.seger; h=Date:Message-Id: Content-Transfer-Encoding:Content-Type:Subject:MIME-Version:To:Reply-To:From: Cc:Content-ID:Content-Description:In-Reply-To:References; bh=q6s4vJZz4Rhvrubf9jmzD1ajGTLVKAo7AHrlOLvKVFA=; b=oTiDRQzlhQAj0xuUaTo0HoQWOK BauTxI7MZsAfatI++6M1LjaFerZ7vE9aYCGwGJPA/zkbe34CHP9WrZvyW6aFD1GlbzroYd+BS7yem 7UUB1eQh5QQP1+syhLJX+YzDmufwnAywl+bZDHt5FStZMqhmopZ52WIiH7HT+4FpGhOWdQBY7RhQi rghTx+GRIj11+s7/CqthlpmEqzpN+47pxM6TLDe86neMy3UBV/UvxS7Pszsj5kPq2x6HJ5lCkZsvF TtnA+g8lYeEM0BUw1A3SB1ohB+6Piqx6tTpOeJ91Oq7b/QbMoTwH7p9oSNZwAN/YjRA4JBOts5lRh x3e8SB/w==;
- Mail-followup-to: debian-lts@lists.debian.org
- Message-id: <E1qifnj-00Gj63-7T@seger.debian.org>
- Reply-to: debian-lts@lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Tue, 19 Sep 2023 20:36:42 CEST
Source: frr
Architecture: source
Version: 7.5.1-1.1+deb10u1
Distribution: buster-security
Urgency: high
Maintainer: David Lamparter <equinox-debian@diac24.net>
Changed-By: Markus Koschany <apo@debian.org>
Checksums-Sha1:
1ac7006bc4b2d081f78fb25ce5d1d55a2b23fc7c 2792 frr_7.5.1-1.1+deb10u1.dsc
21a4552ff613fc4b08b0ca46b8343a84d5567ee1 34460 frr_7.5.1-1.1+deb10u1.debian.tar.xz
15f9861ae41a465ddf29f185abc1ae1d0ac8815f 11784 frr_7.5.1-1.1+deb10u1_amd64.buildinfo
Checksums-Sha256:
59372ee7d17d13e539874f171652b7be87852209f4ba445591e7cf4b56514178 2792 frr_7.5.1-1.1+deb10u1.dsc
22c88afff448a6fb046c9ae03bca4c509dea340095dfbeb68b94f86fd7098957 34460 frr_7.5.1-1.1+deb10u1.debian.tar.xz
e04b8dfc89004a5038aacd075efe439d69f1b434c58ad3a09d9b19798206c6e3 11784 frr_7.5.1-1.1+deb10u1_amd64.buildinfo
Changes:
frr (7.5.1-1.1+deb10u1) buster-security; urgency=high
.
* Non-maintainer upload by the LTS team.
* Fix CVE-2022-36440, CVE-2022-40302, CVE-2022-40318, CVE-2022-43681,
CVE-2023-31490, CVE-2023-38802, CVE-2023-41358, CVE-2023-41360,
CVE-2023-41361 and CVE-2023-41909.
Multiple security vulnerabilities were found in frr, the FRRouting suite
of internet protocols. Maliciously constructed Border Gateway Protocol
(BGP) packages or corrupted tunnel attributes may cause a denial of service
(application crash) which could be exploited by a remote attacker.
Files:
3387c7ee8e92009cf1e5432c186e0506 2792 net optional frr_7.5.1-1.1+deb10u1.dsc
135cf132030df1f6c7b9c13157e2b419 34460 net optional frr_7.5.1-1.1+deb10u1.debian.tar.xz
0056390cda23317131fbfce89baae53d 11784 net optional frr_7.5.1-1.1+deb10u1_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----
iQKjBAEBCgCNFiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmUJ6ktfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD
RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQPHGFwb0BkZWJp
YW4ub3JnAAoJENmtFLlRO1HkITIQAKrkCN4UXnjxQenD4fGa8Wap7l1hX0CyOpuP
XxtFUzCUeDg/9u7+bhPwRySLBGj/FnY4gEm42NKcz3LDFc58eKHdUKzY/EFgOONi
lXDS12PvDyAfUUi6TZYbNPglwEIi01hqlVlW/92lUaKjru6TAyWVlsLnToUhZXb5
nCXbMwpWZa+xSae2GswlRHVLb5nHq9tLKpjoVFbkseVyeXPu3fnuuaeosuT2kfq+
2yyjcB0av8/tO76Y1V9vdMcAtgKOpRQfyZwgMi020p9SOcJxpfn79pcqabS17WG8
P+J8fbpQA4LX9e47PsMT1b6vg4AwFL/YPP1jhEnCOOWfcMMqNHO4ZBDovN/tGFja
ToxTHwrQGM6IZ/ePc2Otz2hE2g+19KOgp+e78MQNsnvaXcAzr8QM8yi0ARtbKY3p
i5XE2jsepwyTIeg1ZvJhuNjTLhcyMzTQ/tqZyE+sK1P7JrckVsiLW01innq6EZsp
FcGTnjVWgiyqJJHGRZJntcycGZMtvSm6+XGWcXEBaCKfBOLFSNZVdtO2GUnReVzQ
Gu/ArCcmQhQ5mqOVl3ttoxnWchFaLbBPc5YwkEiLxrC3nAy4qFCib6crQuix/8Bo
bK8kMxxd2yvmxr6WE8pmD4U3FFbG8rgsjsanwQJS6h2xN7uLD+PJ5tPZDud375+y
MO9ydKRz
=Zv35
-----END PGP SIGNATURE-----