-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sun, 30 Aug 2020 13:47:54 +0200 Source: bacula Architecture: source Version: 9.4.2-2+deb10u1 Distribution: buster Urgency: medium Maintainer: Debian Bacula Team <pkg-bacula-devel@lists.alioth.debian.org> Changed-By: Carsten Leonhardt <leo@debian.org> Changes: bacula (9.4.2-2+deb10u1) buster; urgency=medium . * Backport fix from upstream for CVE-2020-11061: oversized digest strings allow a malicious client to cause a heap overflow in the director's memory Checksums-Sha1: 9174fb2ee980adfeb562dde76e9476f61e7a11c9 3734 bacula_9.4.2-2+deb10u1.dsc ad48326d339efc792fb8cbe5e7c5d7a57c724d4d 85208 bacula_9.4.2-2+deb10u1.debian.tar.xz Checksums-Sha256: 9c0766393953483b1bd6ad2badadce0c875fe4b5a4fd88af8d1e7fab17a79be4 3734 bacula_9.4.2-2+deb10u1.dsc 311b63f9f01f85bf9c2dfff4fbe6e277ed14775f94ec0d4a2b9b13d1facebfc0 85208 bacula_9.4.2-2+deb10u1.debian.tar.xz Files: 559b639c2f025a803c2abe6d2fe302f9 3734 admin optional bacula_9.4.2-2+deb10u1.dsc 329d99c7aadd5a27787acbfca956244f 85208 admin optional bacula_9.4.2-2+deb10u1.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQJDBAEBCgAtFiEETxO/995XSygF6EUmKrIctfbulV4FAl9magoPHGxlb0BkZWJp YW4ub3JnAAoJECqyHLX27pVeQQIQAIuc+F/Rylk7q6UQ14WJvL3MdStu2zkfdo4A ocKC8DDCkLACahy5/GFmXXkRyosl5UXCSt6fimaiBETxNHwyJKuHSYd4KjP6CWAe 0xUhlSCVB43jeSSmIB3/i/cfYQLz0fptzgSHsJG2En3uKDoIZ2BgNgQIKK/hjOSd FOkGKD7W7iAuvxxm4cJlAYQ68/QjYVzO/IbV+QyhZUPyWAapiS/m3tEvvMEqar0Z BxDMArsodzN9GVgzMhYl8qMSJDQTz5YFggaEfyZPcSA+f1P5rodxJiFK+x+LC5MB TgQNmqUsIIA9+de9VTSckIySv0B3XtgmQId9Bwraa+5pcbrccl5bmJlworrbAmpK tVoFZRPRy58YT+t4BMyspohJwe/JUciejtbpeDsZbuf9Be8HSrwV45EmGfKlG52y BQeeFQn+KUINXtkh8HKcAnSQ2qdS/xPp+VQRmjmTgARXG3IFjj/dSUvhE5emf0HT 3XyCGb/aGu3bxuPf8q+3QDRq1mdvbhGZdjck3RvUCSQWXhoJinm6I0R7+AH0iQJP VWwup37cCNghu5WRK+hHBvxEqllfCB8Y6rYxLU7HRmFhsVKDMdIGr5j/jR2zDk3d uIpsJPvC1OaIWlakSdMsbegTD28Q4etkQHOQN2+50ZQnGAN/xCIqd0mb4nw+X8ps XzUj6hOc =B8pC -----END PGP SIGNATURE-----