Back to rdesktop PTS page

Accepted rdesktop 1.8.4-0+deb8u1 (source amd64) into oldstable



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Tue, 19 Feb 2019 11:10:52 +0100
Source: rdesktop
Binary: rdesktop
Architecture: source amd64
Version: 1.8.4-0+deb8u1
Distribution: jessie-security
Urgency: medium
Maintainer: Laszlo Boszormenyi (GCS) <gcs@debian.org>
Changed-By: Emilio Pozuelo Monfort <pochu@debian.org>
Description:
 rdesktop   - RDP client for Windows NT/2000 Terminal Server and Windows Server
Changes:
 rdesktop (1.8.4-0+deb8u1) jessie-security; urgency=medium
 .
   * Non-maintainer upload by the LTS Team.
   * Update to 1.8.4 to fix several CVEs:
     - fix possible integer overflow in s_check_rem() on 32bit arch,
     - CVE-2018-8791: fix minor information leak in rdpdr_process(),
     - CVE-2018-8792: fix denial of service in cssp_read_tsrequest(),
     - CVE-2018-8793: fix remote code execution in cssp_read_tsrequest(),
     - CVE-2018-8794: fix memory corruption in process_bitmap_data(),
     - CVE-2018-8795: fix remote code execution in process_bitmap_data(),
     - CVE-2018-8796: fix denial of service in process_bitmap_data(),
     - CVE-2018-8797: fix remote code execution in process_plane(),
     - CVE-2018-8798: fix minor information leak in rdpsnd_process_ping(),
     - CVE-2018-8799: fix denial of service in process_secondary_order(),
     - CVE-2018-8800: fix remote code execution in ui_clip_handle_data(),
     - CVE-2018-20174: fix major information leak in ui_clip_handle_data(),
     - CVE-2018-20175: fix denial of service in mcs_recv_connect_response()
       and in mcs_parse_domain_params(),
     - CVE-2018-20176: fix denial of service in sec_parse_crypt_info() and
       in sec_recv(),
     - CVE-2018-20177: fix memory corruption in rdp_in_unistr(),
     - CVE-2018-20178: fix denial of service in process_demand_active(),
     - CVE-2018-20179: fix remote code execution in lspci_process(),
     - CVE-2018-20180: fix remote code execution in rdpsnddbg_process(),
     - CVE-2018-20181: fix remote code execution in seamless_process(),
     - CVE-2018-20182: fix remote code execution in seamless_process_line().
Checksums-Sha1:
 7cb105f472dcfdc1282c19621c76501ae05efc0b 1857 rdesktop_1.8.4-0+deb8u1.dsc
 b937573e3f76a494a2b9092a440c9ea3e862d1f3 321448 rdesktop_1.8.4.orig.tar.gz
 4e736dc07b8f19aa854019cf97f75e180093ff3a 9936 rdesktop_1.8.4-0+deb8u1.debian.tar.xz
 4cf0f559337e021f8f8c888c1ae498a5a70ff2aa 161242 rdesktop_1.8.4-0+deb8u1_amd64.deb
Checksums-Sha256:
 dc160ec3fc6e74cb70047e75be38b3b31e31143324c5ae895710fb04e0492434 1857 rdesktop_1.8.4-0+deb8u1.dsc
 9b98b8e73aa83e93aa1d9ae82ce38c08395f64b67799edc24821bb26a84dcd2d 321448 rdesktop_1.8.4.orig.tar.gz
 f34da5bef8eabc82aa2825f7eda87ba2199ca529b8c16e17341acc5507b4fcc5 9936 rdesktop_1.8.4-0+deb8u1.debian.tar.xz
 2a534c4b7cfb7007746b60b696605e238832a44f5bfdff55990fd5782bace41a 161242 rdesktop_1.8.4-0+deb8u1_amd64.deb
Files:
 d264e9eecc0ec1877f6f3c60ca95b425 1857 x11 optional rdesktop_1.8.4-0+deb8u1.dsc
 7273f9dad833f6899a3e5b39d7fdd6f2 321448 x11 optional rdesktop_1.8.4.orig.tar.gz
 5839eda62bcf860783e3a2b26ab97f9d 9936 x11 optional rdesktop_1.8.4-0+deb8u1.debian.tar.xz
 904eaacf7b464b3ecafcef6a0fb99601 161242 x11 optional rdesktop_1.8.4-0+deb8u1_amd64.deb

-----BEGIN PGP SIGNATURE-----
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=BIY8
-----END PGP SIGNATURE-----