Accepted wireshark 2.6.20-0+deb10u4 (source) into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates
- To: debian-changes@lists.debian.org
- Subject: Accepted wireshark 2.6.20-0+deb10u4 (source) into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Sun, 17 Jul 2022 16:02:54 +0000
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ftp-master.debian.org; s=smtpauto.fasolo; h=Date:Message-Id:Subject: Content-Transfer-Encoding:Content-Type:MIME-Version:To:Reply-To:From:Cc: Content-ID:Content-Description:In-Reply-To:References; bh=oS76Kx2pJcgvBZ3psWPS1Cm+4hnyc0yhasgaSM1aVNU=; b=srobTknFv0AFWan3doFhhnpk8e xAvNFz0h6UI87DYZutWAW/Af1dF1tqH2N6VJf8KvlyXVJD8lvDqkjaGPyfY2Z0GfvA2xueBILnWCf sE7TBkEwisIRj2ekd6iD1JkobADldAzQ4ETfmwyeckjmgsHd4EBK2JdDthbN8D0sUIsp7oYTJ/Hib roj7pwm0prsy8VUNJ6AEcfmOXJBW+9nteXibvkBj+wHD0Rf4idErsYJ+2j31BMITGffS9hzw9/3OC Kz7zrds6oSYpCXqlDUMaXkW4BQTUb9SwUDMv4ogukJy9dZ4K/hcK3ChKlP9TPU1Yr+Ata/YQCGKs5 Xn3hNqxQ==;
- Mail-followup-to: debian-devel@lists.debian.org
- Message-id: <E1oD6jO-000J9r-HM@fasolo.debian.org>
- Reply-to: debian-devel@lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sun, 29 May 2022 17:58:46 +0200
Source: wireshark
Architecture: source
Version: 2.6.20-0+deb10u4
Distribution: buster
Urgency: medium
Maintainer: Balint Reczey <rbalint@ubuntu.com>
Changed-By: Markus Koschany <apo@debian.org>
Changes:
wireshark (2.6.20-0+deb10u4) buster; urgency=medium
.
* Non-maintainer upload.
* Fix the following CVE:
* CVE-2021-4181: Crash in the Sysdig Event dissector.
* CVE-2021-4184: Infinite loop in the BitTorrent DHT dissector.
* CVE-2021-4185: Infinite loop in the RTMPT dissector.
* CVE-2021-22191: Improper URL handling in Wireshark.
* CVE-2022-0581: Crash in the CMS protocol dissector.
* CVE-2022-0582: Unaligned access in the CSN.1 protocol dissector.
* CVE-2022-0583: Crash in the PVFS protocol dissector.
* CVE-2022-0585: Large loops in multiple protocol dissectors.
* CVE-2022-0586: Infinite loop in RTMPT protocol dissector.
Checksums-Sha1:
d2eb67c123d6ec6fe28282b19702d723a8be5934 3713 wireshark_2.6.20-0+deb10u4.dsc
27b3e5b9e4d9b9d23055bab50381a026124b2d56 94344 wireshark_2.6.20-0+deb10u4.debian.tar.xz
b472c26b66f15a210e24c35743e5e2af05886e17 6547 wireshark_2.6.20-0+deb10u4_source.buildinfo
Checksums-Sha256:
4e998b5d99012b8ab6071ddbe120154a12c1a6323269ec7d4eb5a45ac8ef914d 3713 wireshark_2.6.20-0+deb10u4.dsc
a1268305e741b039dd7fc9629bc61f5ae0cb536b7d751fd675a698593a06b44e 94344 wireshark_2.6.20-0+deb10u4.debian.tar.xz
7eefce8d66f175d72d35c471c0ad70c8bef1c12bd6c736af8924ab40569812cc 6547 wireshark_2.6.20-0+deb10u4_source.buildinfo
Files:
5ba2466d6a5eb3966388ec80262f457b 3713 net optional wireshark_2.6.20-0+deb10u4.dsc
1bf44d40e7a0816d145e5606e51710a6 94344 net optional wireshark_2.6.20-0+deb10u4.debian.tar.xz
06e70557daf4d60532f37300e6d4ed0d 6547 net optional wireshark_2.6.20-0+deb10u4_source.buildinfo
-----BEGIN PGP SIGNATURE-----
iQKjBAEBCgCNFiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmKTo1hfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD
RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQPHGFwb0BkZWJp
YW4ub3JnAAoJENmtFLlRO1HkizQQALhsmj3szFZfAS7C7jOMf50vX2ANSzZ/RAEU
fyEeYdYt9Q03JsMMvS7BwhHiOUrMcIO69CMs726ZfhE9W03xmcpkwYIbVR7e+f3o
124U6GF4QsiPeHGA5Jrzj0Xld+4G6SBVu59KRaQFXaK+IG2yfNXEwjQCS5D9WcVA
fp3hwz2+DiZIBzZRbwLcmSB0iKu0qGRVwzVpvk+qDrNrT8iGA+YCrT3eIij8/z9T
ZCn4SU/iwZV1p2gsQXsJVAadfF84ZTOr/6GSKiBm22L+N8PwkLI5IM8xZx5i64tb
4shMpofsE1kHMSgMCglQ449d7kvC3de03DC6UXUPztQa2T2+JE07A/hlOkiGYk49
CQUnh2n4ebW7zHiODXZ8BPy7YU5QZoGwPX9C/sOrQbJk6GL/Ik7zJuLz/Z4WwrkP
J1w0tkgtADX0jGQZiHEayIBrChnIeQ5ZOynyTM0xNmcX44ntLSIJusWNmd6c9qJl
B1fAHuGDDGHJHJf7G6SSjW83d2AYOtx9wiO8J4SCcQo1bOXhfvNyCNKHzrcNeIaU
wmmUg+5Vvax+tiYdWqcySipg71UtqQmL/SZw+LsbkNl1A+F76Ud0S/NSCVUJ6h5a
vosYO8140JvxoG9KP+MfPh5PTC3dwF4945693gs1HhLDjONDwsQd+743pbOS7/U9
XUUWCOXH
=W11Y
-----END PGP SIGNATURE-----