Accepted wireshark 2.6.20-0+deb10u5 (source) into oldstable
- To: dispatch@tracker.debian.org, debian-lts-changes@lists.debian.org
- Subject: Accepted wireshark 2.6.20-0+deb10u5 (source) into oldstable
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Wed, 08 Feb 2023 20:50:24 +0000
- Debian: DAK
- Debian-architecture: source
- Debian-archive-action: accept
- Debian-changes: wireshark_2.6.20-0+deb10u5_source.changes
- Debian-source: wireshark
- Debian-suite: oldstable
- Debian-version: 2.6.20-0+deb10u5
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ftp-master.debian.org; s=smtpauto.seger; h=Date:Message-Id: Content-Transfer-Encoding:Content-Type:Subject:MIME-Version:To:Reply-To:From: Cc:Content-ID:Content-Description:In-Reply-To:References; bh=M3+6huuDSmJ0Y8SmaSvB5NDHbKcoUkgzdcPY9yaRc6Q=; b=l9X5UVJBSbieJwEB/nYA5OUJri lZckjYVDMsD/kI0zF0tgVxT8fslLIruHzSjrbnHScKAzyRVDDrlGU7S60Ijp0GJ1IMSXJAn76dwSi MaDpngRkt0opiAqKn3+ryJpX49Vbeg+E/Ggpn5EhVeuLjObGzQP+I+0ECyt9KLieOfM0caikWY76O wqk8ioVQ4wCHAJ1fKFcD3I/bNdVbvOVSApvTtinIynZeD8BQOR9bJQXzLJLEZsR0X3rQfI4PgZRlu 2Fbd6lwnZ01hcpIYmUPM0V++HnhhM/2ySxY8kANV0A2GPyRyWlg6L6HHCTjyrGmCiivTPidNSAn0A Fov1DRCA==;
- Mail-followup-to: debian-lts@lists.debian.org
- Message-id: <E1pPrOa-00DZ3I-5f@seger.debian.org>
- Reply-to: debian-lts@lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Wed, 08 Feb 2023 19:46:07 +0100
Source: wireshark
Architecture: source
Version: 2.6.20-0+deb10u5
Distribution: buster-security
Urgency: high
Maintainer: Balint Reczey <rbalint@ubuntu.com>
Changed-By: Tobias Frost <tobi@debian.org>
Changes:
wireshark (2.6.20-0+deb10u5) buster-security; urgency=high
.
* Non-maintainer upload by the LTS Security Team.
* Apply applicable part of the patch for CVE-2022-4345.
(only one dissector is affected, the others missing the
vulnerable features).
* Apply applicable parts of the patch for CVE-2023-0411.
(see patch -- named after the CVE for details)
* Backport patch for CVE-2023-0412.
* Cherry-pick upstream fix for CVE-2023-0413.
* Apply upstream patch for CVE-2023-0415.
* Apply upstream patch for CVE-2023-0417.
Checksums-Sha1:
b936005999f0871e0113c709973cf5f9564ce483 3562 wireshark_2.6.20-0+deb10u5.dsc
9ebf5da297b70f7639ed91f627845759ba50c3a7 99356 wireshark_2.6.20-0+deb10u5.debian.tar.xz
320ec5f569484ad9cfaab1870e7408e2be08e0bd 27726 wireshark_2.6.20-0+deb10u5_amd64.buildinfo
Checksums-Sha256:
029544033f75d9be96e38dbc73e8a76be5437b5913eadd90983c435c0cb0c505 3562 wireshark_2.6.20-0+deb10u5.dsc
05a549ede7389dbcac2f122582b78bbb9351e26d840b9696964276cd1cd58595 99356 wireshark_2.6.20-0+deb10u5.debian.tar.xz
b67a9660cc5b49d9f7b4f6b8e9fd9c029b4f0feeba2d805d76a3a12b3c2f4b7d 27726 wireshark_2.6.20-0+deb10u5_amd64.buildinfo
Files:
24117ae06bd1080009c16a850e64808b 3562 net optional wireshark_2.6.20-0+deb10u5.dsc
610c3fbf8f2f5d6244b65d30ed389ee2 99356 net optional wireshark_2.6.20-0+deb10u5.debian.tar.xz
afd74bcad01debfbb506e6333376ba43 27726 net optional wireshark_2.6.20-0+deb10u5_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=sC1M
-----END PGP SIGNATURE-----