freerdp (1.0.2-2ubuntu1.1) trusty-security; urgency=medium

  * SECURITY UPDATE: integer overflow in xf_Pointer_New
    - debian/patches/CVE-2014-0250.patch: check width and height in
      libfreerdp-core/fastpath.c, libfreerdp-core/rdp.*,
      libfreerdp-core/update.*.
    - CVE-2014-0250
  * SECURITY UPDATE: integer overflow in license_read_scope_list
    - debian/patches/CVE-2014-0791.patch: check length in
      libfreerdp/core/license.*.
    - CVE-2014-0791
  * SECURITY UPDATE: out-of-bounds write in rdp_recv_tpkt_pdu
    - debian/patches/CVE-2017-2835.patch: properly check length in
      libfreerdp-core/info.c, libfreerdp-core/license.c,
      libfreerdp-core/peer.c, libfreerdp-core/rdp.*,
      libfreerdp-core/capabilities.c, libfreerdp-core/connection.c.
    - CVE-2017-2835
  * SECURITY UPDATE: rdp client read server proprietary certificate DoS
    - debian/patches/CVE-2017-2836.patch: check keylen in
      libfreerdp-core/certificate.c.
    - CVE-2017-2836
  * SECURITY UPDATE: rdp client gcc read server security data DoS
    - debian/patches/CVE-2017-2837.patch: check lengths in
      libfreerdp-core/gcc.c.
    - CVE-2017-2837
  * SECURITY UPDATE: rdp client license read product info DoS
    - debian/patches/CVE-2017-2838.patch: check lengths in
      libfreerdp-core/license.*.
    - CVE-2017-2838
  * SECURITY UPDATE: rdp client license read challenge packet DoS
    - debian/patches/CVE-2017-2839.patch: add checks to
      libfreerdp-core/license.*.
    - CVE-2017-2839

Date: 2017-08-03 14:57:16.153632+00:00
Changed-By: Marc Deslauriers <marc.deslauri...@canonical.com>
https://launchpad.net/ubuntu/+source/freerdp/1.0.2-2ubuntu1.1
Sorry, changesfile not available.
-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes

Reply via email to