freediameter 1.2.1-7+deb10u1 source package in Debian
Changelog
freediameter (1.2.1-7+deb10u1) buster; urgency=medium * Team upload * CVE-2020-6098 (Closes: #985088) Anybody can send a specially crafted Diameter request, which triggers a memory corruption and thus results in a denial-of-service. -- Thorsten Alteholz <email address hidden> Mon, 13 Jul 2020 19:03:02 +0100
Upload details
- Uploaded by:
- Debian Mobcom Maintainers
- Uploaded to:
- Buster
- Original maintainer:
- Debian Mobcom Maintainers
- Architectures:
- any all
- Section:
- misc
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section | |
---|---|---|---|---|
Buster | release | main | misc |
Builds
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
freediameter_1.2.1-7+deb10u1.dsc | 2.6 KiB | e052cafdabc9e083d5451272dd33157e9394d795b6e028da8194b58fe452c7eb |
freediameter_1.2.1.orig.tar.gz | 882.5 KiB | b959ecb54b0268906ef0c33fd162f9a756367beb6f89cc77063b651f953b62ed |
freediameter_1.2.1-7+deb10u1.debian.tar.xz | 10.6 KiB | 8d87c4b502cf582f9aa7c953259700c489acf87184744280e2a71aa965e8d443 |
No changes file available.