freediameter 1.2.1-7+deb10u1 source package in Debian

Changelog

freediameter (1.2.1-7+deb10u1) buster; urgency=medium

  * Team upload
  * CVE-2020-6098 (Closes: #985088)
    Anybody can send a specially crafted Diameter request, which triggers
    a memory corruption and thus results in a denial-of-service.

 -- Thorsten Alteholz <email address hidden>  Mon, 13 Jul 2020 19:03:02 +0100

Upload details

Uploaded by:
Debian Mobcom Maintainers
Uploaded to:
Buster
Original maintainer:
Debian Mobcom Maintainers
Architectures:
any all
Section:
misc
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Buster release main misc

Builds

Downloads

File Size SHA-256 Checksum
freediameter_1.2.1-7+deb10u1.dsc 2.6 KiB e052cafdabc9e083d5451272dd33157e9394d795b6e028da8194b58fe452c7eb
freediameter_1.2.1.orig.tar.gz 882.5 KiB b959ecb54b0268906ef0c33fd162f9a756367beb6f89cc77063b651f953b62ed
freediameter_1.2.1-7+deb10u1.debian.tar.xz 10.6 KiB 8d87c4b502cf582f9aa7c953259700c489acf87184744280e2a71aa965e8d443

No changes file available.

Binary packages built by this source