Accepted net-snmp 5.7.3+dfsg-5+deb10u4 (source) into oldstable
- To: dispatch@tracker.debian.org, debian-lts-changes@lists.debian.org
- Subject: Accepted net-snmp 5.7.3+dfsg-5+deb10u4 (source) into oldstable
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Sun, 15 Jan 2023 02:00:19 +0000
- Debian: DAK
- Debian-architecture: source
- Debian-archive-action: accept
- Debian-changes: net-snmp_5.7.3+dfsg-5+deb10u4_source.changes
- Debian-source: net-snmp
- Debian-suite: oldstable
- Debian-version: 5.7.3+dfsg-5+deb10u4
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ftp-master.debian.org; s=smtpauto.seger; h=Date:Message-Id: Content-Transfer-Encoding:Content-Type:Subject:MIME-Version:To:Reply-To:From: Cc:Content-ID:Content-Description:In-Reply-To:References; bh=+Z/Z7xtVg4SrH/octlChifj7Tctik26bW1u6Os5hEN0=; b=C5txQbYkAdHiMs+rvbvqQ7Zmgp fYXyvxdJiyht357BifQtThFQny6QobqtZJmrWCj97eBGl0beo5zCtJoEBk7zhF1TMEmOD5EyrmOMa 61Omzo+M680ZlmfB5BLYtBl8VjrY+f8MYr0mtIKushYR6lytAN35voURan5e2lRRQ6pHenpNvXf4O thEb4uWs9BzWzJR/l56qtSaheTEKdiyY5oWhwO3cRXs09Mu2/nsFWr6/p5jRt1pLtN5lk78OA6mX4 izsGqZ3FguAg/+vyWGZ5LzL80Rwls4a889l4K1V1fYlMm3eiiKQIbfO6hy5H8nLn3kT4SfxLICbVT mBvjW2hg==;
- Mail-followup-to: debian-lts@lists.debian.org
- Message-id: <E1pGsJn-00Etmx-Dh@seger.debian.org>
- Reply-to: debian-lts@lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sat, 14 Jan 2023 18:19:36 +0100
Source: net-snmp
Architecture: source
Version: 5.7.3+dfsg-5+deb10u4
Distribution: buster-security
Urgency: high
Maintainer: Net-SNMP Packaging Team <pkg-net-snmp-devel@lists.alioth.debian.org>
Changed-By: Guilhem Moulin <guilhem@debian.org>
Closes: 1024020
Changes:
net-snmp (5.7.3+dfsg-5+deb10u4) buster-security; urgency=high
.
* Non-maintainer upload by the LTS Security Team.
* CVE-2022-44792: A NULL dereference in handle_ipDefaultTTL() could allow a
remote attacker (with write access) to crash the instance via a crafted
UDP packet, resulting in Denial of Service. (Closes: #1024020)
* CVE-2022-44793: A NULL dereference in handle_ipv6IpForwarding() could
allow a remote attacker (with write access) to crash the instance via a
crafted UDP packet, resulting in Denial of Service. (Closes: #1024020)
Checksums-Sha1:
8464f03bab6233cd56f32f917674aa73df26aacf 3000 net-snmp_5.7.3+dfsg-5+deb10u4.dsc
835174da528331bd050d365cfbbfd4dec83d7d22 86536 net-snmp_5.7.3+dfsg-5+deb10u4.debian.tar.xz
0d0a92a991a855751082e3fbfe6b5493a0413c03 12229 net-snmp_5.7.3+dfsg-5+deb10u4_amd64.buildinfo
Checksums-Sha256:
6bf084041546f2ca12e8ef122efeaa655275d8b1415e1a427976e7d69357d11a 3000 net-snmp_5.7.3+dfsg-5+deb10u4.dsc
b99894218523936004d0f0e13418e5d90a4dfefd6eee6bdcbd5943f6a11042bc 86536 net-snmp_5.7.3+dfsg-5+deb10u4.debian.tar.xz
e938ae7c2085005b32f10f7e9317e580bedfbc5994709a09b140a68822a122af 12229 net-snmp_5.7.3+dfsg-5+deb10u4_amd64.buildinfo
Files:
8e9216708960e1c9efdec15d3b40a312 3000 net optional net-snmp_5.7.3+dfsg-5+deb10u4.dsc
856d7b12176415e37cdb414aeaac9901 86536 net optional net-snmp_5.7.3+dfsg-5+deb10u4.debian.tar.xz
e6110cec95b474b2d1c8f689734678e0 12229 net optional net-snmp_5.7.3+dfsg-5+deb10u4_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=dou7
-----END PGP SIGNATURE-----