protobuf (3.6.1.3-2+deb10u1) buster-security; urgency=medium
authorHelmut Grohne <helmut@subdivi.de>
Tue, 4 Apr 2023 15:09:31 +0000 (16:09 +0100)
committerHelmut Grohne <helmut@subdivi.de>
Tue, 4 Apr 2023 15:09:31 +0000 (16:09 +0100)
commitf96aec1255ae6cda20f2cc39b8ded83a231117c4
tree4c02540f57cdedc208051c6259d301cbb6ee7992
parentbfc1c4fce4bc56a73fa3d76ae9ef22a4a3ca003f
parentccd0edb9e2fa6a35b7bd3c47f7beeadf8bc7750d
protobuf (3.6.1.3-2+deb10u1) buster-security; urgency=medium

  * Non-maintainer upload by the LTS Team.
  * Fix CVE-2021-22569 (DoS in Java)
  * Fix CVE-2021-22570 (NULL pointer dereference)
  * Fix CVE-2022-1941 (memory DoS)

[dgit import unpatched protobuf 3.6.1.3-2+deb10u1]
43 files changed:
debian/changelog
debian/clean
debian/compat
debian/control
debian/copyright
debian/gbp.conf
debian/gmock/Makefile.am
debian/gmock/configure.ac
debian/gmock/gtest/Makefile.am
debian/gmock/gtest/configure.ac
debian/java-build.xml
debian/libprotobuf-dev.dirs
debian/libprotobuf-dev.install
debian/libprotobuf-java.poms
debian/libprotobuf-lite17.install
debian/libprotobuf17.install
debian/libprotoc-dev.dirs
debian/libprotoc-dev.install
debian/libprotoc17.install
debian/patches/CVE-2021-22569.patch
debian/patches/CVE-2021-22570.patch
debian/patches/CVE-2022-1941.patch
debian/patches/default_python_version
debian/patches/disable_local_gmock.patch
debian/patches/fix_google_test_link.patch
debian/patches/hurd.patch
debian/patches/java-test-scope.patch
debian/patches/misleading-indentation.patch
debian/patches/s390x.patch
debian/patches/series
debian/protobuf-compiler.docs
debian/protobuf-compiler.install
debian/protobuf-compiler.manpages
debian/protoc.xml
debian/python-protobuf.README.Debian
debian/python-protobuf3.README.Debian
debian/ruby-google-protobuf.docs
debian/rules
debian/run_protoc
debian/source/format
debian/tests/control
debian/tests/simple
debian/watch