[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted freerdp2 2.2.0+dfsg1-1~bpo10+1 (source) into buster-backports



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 31 Aug 2020 11:39:05 +0200
Source: freerdp2
Architecture: source
Version: 2.2.0+dfsg1-1~bpo10+1
Distribution: buster-backports
Urgency: medium
Maintainer: Debian Remote Maintainers <debian-remote@lists.debian.org>
Changed-By: Christoph Martin <martin@uni-mainz.de>
Closes: 919281 940925 955840 958230 965979
Changes:
 freerdp2 (2.2.0+dfsg1-1~bpo10+1) buster-backports; urgency=medium
 .
   * Rebuild for buster-backports
 .
 freerdp2 (2.2.0+dfsg1-1) unstable; urgency=medium
 .
   * New upstream release.
     + CVE-2020-15103: Integer overflow due to missing input sanitation in
       rdpegfx channel. (Closes: #965979).
   * debian/patches:
     + Drop 0001-mask-CACHED_BRUSH-when-checking-brush-style.patch. Applied
       upstream.
   * debian/copyright:
     + Update copyright attributions.
   * debian/libfreerdp2-2.symbols:
     + Update symbols.
   * debian/libfreerdp-server2-2.symbols:
     + Update symbols.
 .
 freerdp2 (2.1.2+dfsg1-2) unstable; urgency=medium
 .
   [ Konstantin Demin ]
   * debian/patches:
     + Add 0001-mask-CACHED_BRUSH-when-checking-brush-style.patch. Fix
       regression introduced in 2.1.2.
 .
 freerdp2 (2.1.2+dfsg1-1) unstable; urgency=medium
 .
   * New upstream release.
     - CVE-2020-4033: Out of bound read in RLEDECOMPRESS
     - CVE-2020-4031: Use-After-Free in gdi_SelectObject
     - CVE-2020-4032: Integer casting vulnerability in
       `update_recv_secondary_order`
     - CVE-2020-4030: OOB read in `TrioParse`
     - CVE-2020-11099: OOB Read in license_read_new_or_upgrade_license_packet
     - CVE-2020-11098: Out-of-bound read in glyph_cache_put
     - CVE-2020-11097: OOB read in ntlm_av_pair_get
     - CVE-2020-11095: Global OOB read in update_recv_primary_order
     - CVE-2020-11096: Global OOB read in update_read_cache_bitmap_v3_order
   * debian/copyright:
     + Update auto-generated copyright.in file.
     + Update copyright attributions.
   * debian/libwinpr2-2.symbols:
     + Update symbols.
 .
 freerdp2 (2.1.1+dfsg1-1) unstable; urgency=medium
 .
   [ Konstantin Demin ]
   * New upstream release.
     - Fix smartcard login failures. (Closes: #919281)
     - Fix crash when /gfx option is used with /sound option.
       (Closes: #940925).
   * debian/{copyright,rules,watch}:
     + Use upstream tarball instead of Git snapshot.
   * debian/control:
     + Drop needless libdbus-glib-1-dev. (Closes: #955840).
     + Bump Standards-Version: to 4.5.0. No changes needed.
     + wrap-and-sort Build-Depends.
     + Update Homepage URL scheme to https.
   * debian/patches:
     + Drop 0001_CVE-2019-17177.patch. Applied upstream.
     + Drop 0002_fix-channels-smartcard-fix-statusw-call.patch.
       Applied upstream.
     + Refresh 1001_spelling-fixes.patch.
     + Add 2001-fake-git-revision.patch. avoid Git interaction during build.
   * debian/copyright:
     + Update upstream Source URL scheme to https.
   * debian/rules:
     + Rework layout.
     + Don't build freerdp-proxy so far.
     + Specify correct build type.
     + Fix build-time headers.
     + Enable extended debug logging in freerdp2 itself.
   * debian/{control,rules}:
     + Enable image scaling support in freerdp.
   * debian/*.symbols:
     + Update symbols files.
 .
   [ Mike Gabriel ]
   * debian/control:
     + Add B-D: libpam0g-dev. (Closes: #958230).
     + Bump DH compat level to version 13.
   * debian/rules:
     + Re-add get-orig-source target for developers' convenience.
   * debian/copyright:
     + Update auto-generated copyright.in file.
     + Update copyright attributions.
Checksums-Sha1:
 54b0f4bfe078a73bf37c09b49f2c31a48512c537 3595 freerdp2_2.2.0+dfsg1-1~bpo10+1.dsc
 e1f8d3401ba4197c722c822ed0a4459592a3eaca 1939508 freerdp2_2.2.0+dfsg1.orig.tar.xz
 084876142a0a8ddef71b60936b881b6d3bca4d9d 42820 freerdp2_2.2.0+dfsg1-1~bpo10+1.debian.tar.xz
 604b95fdfd29f7713e4038d3c4314e5470776079 23638 freerdp2_2.2.0+dfsg1-1~bpo10+1_amd64.buildinfo
Checksums-Sha256:
 7053d9268d8e1a1022a6cc4f0c11a4da73f4ebaafb0fef8319cd30a2d9f00c68 3595 freerdp2_2.2.0+dfsg1-1~bpo10+1.dsc
 2bbf503ee8ad52b57c636d50c1b1bc78dbc54a54b2d60e695365a514f8ae6a52 1939508 freerdp2_2.2.0+dfsg1.orig.tar.xz
 908b5d5f46ba2ad765433c92ee9d4050eea9a176cd8c963a56f8b9bd36d3da25 42820 freerdp2_2.2.0+dfsg1-1~bpo10+1.debian.tar.xz
 bec3272cc9f03b335572f73d85b2eab44cf00a0e625c01d2e664f8d6652af842 23638 freerdp2_2.2.0+dfsg1-1~bpo10+1_amd64.buildinfo
Files:
 747073f52db2d2e1ad69a49c46b1c8d8 3595 x11 optional freerdp2_2.2.0+dfsg1-1~bpo10+1.dsc
 05aa9bbb07776b572432fff2582df9d0 1939508 x11 optional freerdp2_2.2.0+dfsg1.orig.tar.xz
 34aa3e06b85553a8cc81c7999aded10a 42820 x11 optional freerdp2_2.2.0+dfsg1-1~bpo10+1.debian.tar.xz
 8e10d6a64452f15f1653ed6638a3b586 23638 x11 optional freerdp2_2.2.0+dfsg1-1~bpo10+1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=icvZ
-----END PGP SIGNATURE-----


Reply to: