Accepted frr 7.5.1-1.1+deb10u1 (source) into oldoldstable
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Tue, 19 Sep 2023 20:36:42 CEST
Source: frr
Architecture: source
Version: 7.5.1-1.1+deb10u1
Distribution: buster-security
Urgency: high
Maintainer: David Lamparter <equinox-debian@diac24.net>
Changed-By: Markus Koschany <apo@debian.org>
Checksums-Sha1:
1ac7006bc4b2d081f78fb25ce5d1d55a2b23fc7c 2792 frr_7.5.1-1.1+deb10u1.dsc
21a4552ff613fc4b08b0ca46b8343a84d5567ee1 34460 frr_7.5.1-1.1+deb10u1.debian.tar.xz
15f9861ae41a465ddf29f185abc1ae1d0ac8815f 11784 frr_7.5.1-1.1+deb10u1_amd64.buildinfo
Checksums-Sha256:
59372ee7d17d13e539874f171652b7be87852209f4ba445591e7cf4b56514178 2792 frr_7.5.1-1.1+deb10u1.dsc
22c88afff448a6fb046c9ae03bca4c509dea340095dfbeb68b94f86fd7098957 34460 frr_7.5.1-1.1+deb10u1.debian.tar.xz
e04b8dfc89004a5038aacd075efe439d69f1b434c58ad3a09d9b19798206c6e3 11784 frr_7.5.1-1.1+deb10u1_amd64.buildinfo
Changes:
frr (7.5.1-1.1+deb10u1) buster-security; urgency=high
.
* Non-maintainer upload by the LTS team.
* Fix CVE-2022-36440, CVE-2022-40302, CVE-2022-40318, CVE-2022-43681,
CVE-2023-31490, CVE-2023-38802, CVE-2023-41358, CVE-2023-41360,
CVE-2023-41361 and CVE-2023-41909.
Multiple security vulnerabilities were found in frr, the FRRouting suite
of internet protocols. Maliciously constructed Border Gateway Protocol
(BGP) packages or corrupted tunnel attributes may cause a denial of service
(application crash) which could be exploited by a remote attacker.
Files:
3387c7ee8e92009cf1e5432c186e0506 2792 net optional frr_7.5.1-1.1+deb10u1.dsc
135cf132030df1f6c7b9c13157e2b419 34460 net optional frr_7.5.1-1.1+deb10u1.debian.tar.xz
0056390cda23317131fbfce89baae53d 11784 net optional frr_7.5.1-1.1+deb10u1_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=Zv35
-----END PGP SIGNATURE-----
Reply to: