Hi Salvatore,

Salvatore Bonaccorso <car...@debian.org> ezt írta (időpont: 2023. ápr.
4., K, 20:36):
>
> Hi Bálint,
>
> On Tue, Apr 04, 2023 at 06:22:09PM +0200, Bálint Réczey wrote:
> > Control: tags -1 pending fixed-upstream
> >
> > Hi Salvatore,
> >
> > Salvatore Bonaccorso <car...@debian.org> ezt írta (időpont: 2023.
> > márc. 31., P, 21:01):
> > >
> > > Source: wireshark
> > > Version: 4.0.3-1
> > > Severity: important
> > > Tags: security upstream
> > > Forwarded: https://gitlab.com/wireshark/wireshark/-/issues/18839
> > > X-Debbugs-Cc: car...@debian.org, Debian Security Team 
> > > <t...@security.debian.org>
> > >
> > > Hi,
> > >
> > > The following vulnerability was published for wireshark.
> > >
> > > CVE-2023-1161[0]:
> > > | ISO 15765 and ISO 10681 dissector crash in Wireshark 4.0.0 to 4.0.3
> > > | and 3.6.0 to 3.6.11 allows denial of service via packet injection or
> > > | crafted capture file
> > >
> > >
> > > If you fix the vulnerability please also make sure to include the
> > > CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> >
> > I have committed the fix to the packaging repository with the new
> > upstream release.
> > I plan uploading it when the freeze is over, unless the Security Team
> > finds the issue severe enough to warrant an earlier upload.
>
> Agreed!

The freeze can last quite long, thus to not hold back derivatives and
keep updates small-ish I'm uploading new point releases to
experimental instead of just waiting.

Cheers,
Balint

Reply via email to