Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
3ee9bb40 by Moritz Mühlenhoff at 2023-11-01T12:20:14+01:00
freerdp2 spu

- - - - -


2 changed files:

- data/CVE/list
- data/next-point-update.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -9773,12 +9773,16 @@ CVE-2023-41034 (Eclipse Leshan is a device management 
server and client Java imp
 CVE-2023-40589 (FreeRDP is a free implementation of the Remote Desktop 
Protocol (RDP), ...)
        {DLA-3606-1}
        - freerdp2 2.11.2+dfsg1-1 (bug #1051638)
+       [bookworm] - freerdp2 <no-dsa> (Minor issue)
+       [bullseye] - freerdp2 <no-dsa> (Minor issue)
        NOTE: 
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-gc34-mw6m-g42x
        NOTE: 
https://github.com/FreeRDP/FreeRDP/commit/16141a30f983dd6f7a6e5b0356084171942c9416
 (3.0.0-beta3)
        NOTE: 
https://github.com/FreeRDP/FreeRDP/commit/c659973bb4cd65c065f2fe1a807dbc6805c684c6
 (2.11.0)
 CVE-2023-39356 (FreeRDP is a free implementation of the Remote Desktop 
Protocol (RDP), ...)
        {DLA-3606-1}
        - freerdp2 2.11.2+dfsg1-1 (bug #1051638)
+       [bookworm] - freerdp2 <no-dsa> (Minor issue)
+       [bullseye] - freerdp2 <no-dsa> (Minor issue)
        NOTE: 
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q5v5-qhj5-mh6m
        NOTE: 
https://github.com/FreeRDP/FreeRDP/commit/889348a86e49bc8f1351ed6496d847b32db5f86e
 (2.11.0)
        NOTE: 
https://github.com/FreeRDP/FreeRDP/commit/23db2f4e6ba71f1c10c543f24de595d7340adb46
 (2.11.1)
@@ -9790,29 +9794,39 @@ CVE-2023-39355 (FreeRDP is a free implementation of the 
Remote Desktop Protocol
 CVE-2023-39354 (FreeRDP is a free implementation of the Remote Desktop 
Protocol (RDP), ...)
        {DLA-3606-1}
        - freerdp2 2.11.2+dfsg1-1 (bug #1051638)
+       [bookworm] - freerdp2 <no-dsa> (Minor issue)
+       [bullseye] - freerdp2 <no-dsa> (Minor issue)
        NOTE: 
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c3r2-pxxp-f8r6
        NOTE: 
https://github.com/FreeRDP/FreeRDP/commit/82ac0164f330c08ddd9a6ef6f3dbf846c4b79def
 (2.11.0)
        NOTE: 
https://github.com/FreeRDP/FreeRDP/commit/9a1ee1bae5a9561f5031a7b69129f10458b62d4a
 (2.11.0)
 CVE-2023-39353 (FreeRDP is a free implementation of the Remote Desktop 
Protocol (RDP), ...)
        {DLA-3606-1}
        - freerdp2 2.11.2+dfsg1-1 (bug #1051638)
+       [bookworm] - freerdp2 <no-dsa> (Minor issue)
+       [bullseye] - freerdp2 <no-dsa> (Minor issue)
        NOTE: 
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hg53-9j9h-3c8f
        NOTE: 
https://github.com/FreeRDP/FreeRDP/commit/efa0567c027239b901ccdc590b9e229e0111c68b
 (2.11.0)
        NOTE: 
https://github.com/FreeRDP/FreeRDP/commit/9ed6d6baede27d5006e0e4c9bec8e506f695cb6a
 (2.11.0)
 CVE-2023-39352 (FreeRDP is a free implementation of the Remote Desktop 
Protocol (RDP), ...)
        {DLA-3606-1}
        - freerdp2 2.11.2+dfsg1-1 (bug #1051638)
+       [bookworm] - freerdp2 <no-dsa> (Minor issue)
+       [bullseye] - freerdp2 <no-dsa> (Minor issue)
        NOTE: 
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-whwr-qcf2-2mvj
        NOTE: 
https://github.com/FreeRDP/FreeRDP/commit/7daaba3c1411f71ac7260d01216ab8f8d3687c65
 (3.0.0-beta1)
        NOTE: 
https://github.com/FreeRDP/FreeRDP/commit/856ecaa463e963ecfebc9734423d69139e7b3916
 (2.11.0)
 CVE-2023-39351 (FreeRDP is a free implementation of the Remote Desktop 
Protocol (RDP), ...)
        {DLA-3606-1}
        - freerdp2 2.11.2+dfsg1-1 (bug #1051638)
+       [bookworm] - freerdp2 <no-dsa> (Minor issue)
+       [bullseye] - freerdp2 <no-dsa> (Minor issue)
        NOTE: 
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q9x9-cqjc-rgwq
        NOTE: 
https://github.com/FreeRDP/FreeRDP/commit/99e243cdbc31f66b5c917452c8fed3276e8bdcd5
 (2.11.0)
 CVE-2023-39350 (FreeRDP is a free implementation of the Remote Desktop 
Protocol (RDP), ...)
        {DLA-3606-1}
        - freerdp2 2.11.2+dfsg1-1 (bug #1051638)
+       [bookworm] - freerdp2 <no-dsa> (Minor issue)
+       [bullseye] - freerdp2 <no-dsa> (Minor issue)
        NOTE: 
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-rrrv-3w42-pffh
        NOTE: 
https://github.com/FreeRDP/FreeRDP/commit/7ece410ce5b5660b9191e1ccb6835158afa11822
 (2.11.0)
 CVE-2023-34392 (A Missing Authentication for Critical Function vulnerability 
in the Sc ...)


=====================================
data/next-point-update.txt
=====================================
@@ -22,3 +22,27 @@ CVE-2023-42117
        [bookworm] - exim4 4.96-15+deb12u3
 CVE-2023-42119
        [bookworm] - exim4 4.96-15+deb12u3
+CVE-2023-39350
+       [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-39351
+       [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-39352
+       [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-39353
+       [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-39354
+       [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-39356
+       [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-40181
+       [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-40186
+       [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-40188
+       [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-40567
+       [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-40569
+       [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1
+CVE-2023-40589
+       [bookworm] - freerdp2 2.11.2+dfsg1-1~deb12u1



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3ee9bb4080f6a15c50724fe39ac78503f962a869

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3ee9bb4080f6a15c50724fe39ac78503f962a869
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to