Accepted ini4j 0.5.4-1~deb10u1 (source) into oldstable
- To: debian-lts-changes@lists.debian.org, dispatch@tracker.debian.org
- Subject: Accepted ini4j 0.5.4-1~deb10u1 (source) into oldstable
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Mon, 28 Nov 2022 09:50:24 +0000
- Debian: DAK
- Debian-architecture: source
- Debian-archive-action: accept
- Debian-changes: ini4j_0.5.4-1~deb10u1_source.changes
- Debian-source: ini4j
- Debian-suite: oldstable
- Debian-version: 0.5.4-1~deb10u1
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ftp-master.debian.org; s=smtpauto.seger; h=Date:Message-Id: Content-Transfer-Encoding:Content-Type:Subject:MIME-Version:To:Reply-To:From: Cc:Content-ID:Content-Description:In-Reply-To:References; bh=D4Rob79uNK9kYFG5VNO7V+DS1mh+0U9XxJiMSOfUcdg=; b=J2W1cX6LdjuwM0tHAUVi2WtXY7 a8mv8KQb1oh0N5m8+P1F97teHFzeGB4xpnZi6zy6Fn7SmweuyFj0Uki5tiIvn2+3xE3Lt5onhPD1v 1AtrE3dgbzzj1iUXfRxNePNrkIZskzhbC23HfAUNrAqpOtNRl1q57UFWYEKILfi/a3ZopnXw2p5ND Qd83nGH/FMulcFumYVZmVTLByRMwP/c2kYRQbuYh9jTQEFlBmRs01abZitEaAn9J0uwVTQgaoQpit lsOfng24wnIHMyrIDzna4/q/IADsvwnTDeHl8MELZs35m6JeaUXmNvncSco4EzQAt0TCxu0oh0tFx pR3Cyz3w==;
- Mail-followup-to: debian-lts@lists.debian.org
- Message-id: <E1ozamO-006db8-57@seger.debian.org>
- Reply-to: debian-lts@lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Mon, 28 Nov 2022 10:33:54 CET
Source: ini4j
Architecture: source
Version: 0.5.4-1~deb10u1
Distribution: buster-security
Urgency: high
Maintainer: Debian Java Maintainers <pkg-java-maintainers@lists.alioth.debian.org>
Changed-By: Markus Koschany <apo@debian.org>
Checksums-Sha1:
c95ec7bfec36b1823102bb259327f06a6310b0c9 2153 ini4j_0.5.4-1~deb10u1.dsc
78c366083332bce65b67210256076fdbd71c77a7 150900 ini4j_0.5.4.orig.tar.xz
743529c83e6e0a3dbdc0579749d7a1db3b6e95d6 4508 ini4j_0.5.4-1~deb10u1.debian.tar.xz
a7e882ff3c241dec47deba38e2a3075044dcfb87 13011 ini4j_0.5.4-1~deb10u1_amd64.buildinfo
Checksums-Sha256:
0539486d4b002c8a0faf80e212d186ef9da755caaaad48f6cad30e8ada965942 2153 ini4j_0.5.4-1~deb10u1.dsc
0194ee19e98c0350ef4723ab748a0cc98964cf28008b5bb90c92ba501665243c 150900 ini4j_0.5.4.orig.tar.xz
22c7ea65e2d7f3a876f4e9f908428fd142c18e5bd9c0cc5dccbe4a250d370afa 4508 ini4j_0.5.4-1~deb10u1.debian.tar.xz
7e6f1212aca85fa6643c79634ddbd78c72beeb9f4e0545f67aa0c4b9d4440a8b 13011 ini4j_0.5.4-1~deb10u1_amd64.buildinfo
Changes:
ini4j (0.5.4-1~deb10u1) buster-security; urgency=high
.
* Team upload.
* Backport ini4j from Bullseye to address CVE-2022-41404: An issue in the
fetch() method in the BasicProfile class of org.ini4j before v0.5.4 allows
attackers to cause a Denial of Service (DoS) via unspecified vectors.
* Revert to debhelper-compat = 12.
Files:
d7427b4ea1f9aca36f2473dac36d7b9d 2153 java optional ini4j_0.5.4-1~deb10u1.dsc
30ec2f2179c3e820f204ce10eb5870c4 150900 java optional ini4j_0.5.4.orig.tar.xz
994227c8502225c863f0abadad80773c 4508 java optional ini4j_0.5.4-1~deb10u1.debian.tar.xz
587b3048ff127227e6ba2db49f898c5b 13011 java optional ini4j_0.5.4-1~deb10u1_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=UFZ3
-----END PGP SIGNATURE-----