[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted ssvnc 1.0.29-4+deb10u1 (source) into proposed-updates->stable-new, proposed-updates



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sun, 31 May 2020 20:58:21 +0200
Source: ssvnc
Architecture: source
Version: 1.0.29-4+deb10u1
Distribution: buster
Urgency: medium
Maintainer: Magnus Holmgren <holmgren@debian.org>
Changed-By: Mike Gabriel <sunweaver@debian.org>
Closes: 945827
Changes:
 ssvnc (1.0.29-4+deb10u1) buster; urgency=medium
 .
   * Non-maintainer upload by the LTS team.
   * Porting of libvncclient security patches (Closes: #945827):
     - CVE-2018-20020: heap out-of-bound write vulnerability inside structure
       in VNC client code.
     - CVE-2018-20021: CWE-835: Infinite loop vulnerability in VNC client code.
     - CVE-2018-20022: CWE-665: Improper Initialization vulnerability.
     - CVE-2018-20024: null pointer dereference that can result DoS.
Checksums-Sha1:
 3d20f87dd974ba4a5f857c35094505f927cc9f14 1963 ssvnc_1.0.29-4+deb10u1.dsc
 a9ea58138bca0d6b780366ffbad99fdec1c0ff9d 13316 ssvnc_1.0.29-4+deb10u1.debian.tar.xz
 0da89bf4d2f135645784a24cc94a8d19037bbd97 9110 ssvnc_1.0.29-4+deb10u1_source.buildinfo
Checksums-Sha256:
 5f9a15709b2ee3bb14bd37495e00db07791cb46551fd29ca2f4aa5b6f0ef920a 1963 ssvnc_1.0.29-4+deb10u1.dsc
 e22e029996bce20c2052937acb821c6e522ef52a51b7bfe7ad0834f7f94656ff 13316 ssvnc_1.0.29-4+deb10u1.debian.tar.xz
 11b9c639ae052ca24295b8c141d081939445686c2f81ce90354b4e6a343e3e8c 9110 ssvnc_1.0.29-4+deb10u1_source.buildinfo
Files:
 031c38abd4d775c536d9b697e26cf5f1 1963 net optional ssvnc_1.0.29-4+deb10u1.dsc
 2c13ae4df1eecb930696ce6086482a26 13316 net optional ssvnc_1.0.29-4+deb10u1.debian.tar.xz
 96f4c83039229adecc377d59186a0fc3 9110 net optional ssvnc_1.0.29-4+deb10u1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=9gVB
-----END PGP SIGNATURE-----


Reply to: