Accepted freerdp2 2.9.0+dfsg1-1 (source) into unstable
- To: debian-devel-changes@lists.debian.org
- Subject: Accepted freerdp2 2.9.0+dfsg1-1 (source) into unstable
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Mon, 28 Nov 2022 09:34:13 +0000
- Debian: DAK
- Debian-architecture: source
- Debian-archive-action: accept
- Debian-changes: freerdp2_2.9.0+dfsg1-1_source.changes
- Debian-source: freerdp2
- Debian-suite: unstable
- Debian-version: 2.9.0+dfsg1-1
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ftp-master.debian.org; s=smtpauto.fasolo; h=Date:Message-Id: Content-Transfer-Encoding:Content-Type:Subject:MIME-Version:To:Reply-To:From: Cc:Content-ID:Content-Description:In-Reply-To:References; bh=p+kyXSTTbLYGwr9Kq0be1smdUYysyoTwS6RqqxoSMjU=; b=H9zG3kqLFRY52iTrbdKxM2RRez F05XuepahbvnPeNnKxhzmrxwSqhsCk94w2rjelYe7koPyKVjdW9c3TWXaOr6L7TyIKBczh7YVUQcp zwp0ukKgy8FGF1sTZIea0uUkm4YMEoQIbN23hVm+X6j7ma+NITLKfYwdq0Fl+t6b1+kguOaEO5OiM nTH4MsoITJsS1n/JMg6Fx25rAY/JS58NFIovQLQBtTw0W9xZafvzoCYsV+VbDWCd+YjqQeSKctZc4 ZcvrjQpCbVkKJL06kqwVRduqsYSna8viAqRQ6orLejrJRWOfvfcI1Ji3DmdLGg8gHx9fopL9VKhLq KLxnB8tg==;
- Mail-followup-to: debian-devel@lists.debian.org
- Message-id: <E1ozaWj-0028nH-0m@fasolo.debian.org>
- Reply-to: debian-devel@lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Mon, 28 Nov 2022 09:51:57 +0100
Source: freerdp2
Architecture: source
Version: 2.9.0+dfsg1-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Remote Maintainers <debian-remote@lists.debian.org>
Changed-By: Mike Gabriel <sunweaver@debian.org>
Closes: 1024511 1024758
Changes:
freerdp2 (2.9.0+dfsg1-1) unstable; urgency=medium
.
* New upstream release. (Closes: #1024511).
- CVE-2022-39316: Resolve out of bound read in ZGFX decoder component.
- CVE-2022-39317: Resolve missing a range check for input offset index
in ZGFX decoder.
- CVE-2022-39318: Resolve missing input validation in `urbdrc` channel.
- CVE-2022-39319: Resolve missing input length validation in the `urbdrc`
channel
- CVE-2022-39320: Resolve attempting integer addition on too narrow types
leading to allocation of a buffer too small holding the data written.
- CVE-2022-39347: Resolve missing path canonicalization and base path check
for `drive` channel.
- CVE-2022-41877: Resolv missing input length validation in `drive` channel.
- Test if packages' executables can be run without 'undefined symbol:
winpr_PathMakePath' error. (Closes: #1024758).
* debian/copyright:
+ Update auto-generated copyright.in file.
+ Update copyright attributions.
* debian/*.symbols:
+ Update .symbols files.
Checksums-Sha1:
4834f50dc481c1a3cdd2d181a8ce6ced4a1ffaba 3498 freerdp2_2.9.0+dfsg1-1.dsc
3d5e362ad4be0107c08f459b345e732ac83e56da 2262664 freerdp2_2.9.0+dfsg1.orig.tar.xz
72626512b0c5c9f122d684b2803d4f0af546a5d7 43236 freerdp2_2.9.0+dfsg1-1.debian.tar.xz
3210a70ec806c78d0ebd2aa1b92116ae6763d815 14073 freerdp2_2.9.0+dfsg1-1_source.buildinfo
Checksums-Sha256:
fba238c9e034cfa28110af5739bf8ab93ca85f80b836631036e4054f3856b43e 3498 freerdp2_2.9.0+dfsg1-1.dsc
aaa44414f332bbaf15193fbab581ca066b6de1b953398c6c8a16d8445f6f9584 2262664 freerdp2_2.9.0+dfsg1.orig.tar.xz
a5e300e5487b20110813f351a8f239bf9b12804019bf1872f8a8fc8c94571af8 43236 freerdp2_2.9.0+dfsg1-1.debian.tar.xz
bfd835022800352f494622c0e56e7f9890a152b212e2d56b69fae91fb9a5796d 14073 freerdp2_2.9.0+dfsg1-1_source.buildinfo
Files:
ca076bd968af75b585bca40a0c8affc9 3498 x11 optional freerdp2_2.9.0+dfsg1-1.dsc
f6cca66e0dbaa6461963be8c93a1a34e 2262664 x11 optional freerdp2_2.9.0+dfsg1.orig.tar.xz
e687bfa41ffcd650b52241aea4fb00f4 43236 x11 optional freerdp2_2.9.0+dfsg1-1.debian.tar.xz
9288944d85c6d441e5e55a3f0e1b616f 14073 x11 optional freerdp2_2.9.0+dfsg1-1_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=JYnP
-----END PGP SIGNATURE-----