[ubuntu/plucky-proposed] vino 3.22.0-7ubuntu1 (Accepted)

Gianfranco Costamagna locutusofborg at debian.org
Sun Dec 22 22:55:12 UTC 2024


vino (3.22.0-7ubuntu1) plucky; urgency=low

  * Merge from Debian unstable. Remaining changes:
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2020-25708.patch: fix possible divide-by-zero in
      server/libvncserver/rfbserver.c.
    - CVE-2020-25708
  * Fix build with newer libminiupnpc18
  * SECURITY UPDATE: NULL pointer dereference
    - debian/patches/CVE-2020-14397.patch: add missing NULL pointer checks
      in server/libvncserver/rfbregion.c, server/libvncserver/rfbserver.c.
    - CVE-2020-14397
  * SECURITY UPDATE: out-of-bounds access via encodings
    - debian/patches/CVE-2020-1440x.patch: prevent OOB accesses in
      server/libvncserver/corre.c, server/libvncserver/hextile.c,
      server/libvncserver/rre.c.
    - CVE-2020-14402
    - CVE-2020-14403
    - CVE-2020-14404
  * Sync with Debian. Remaining change:
    - debian/control, debian/patches/05_use-system-miniupnpc.patch:
      + Build with system miniupnpc library

Date: Sun, 22 Dec 2024 23:51:59 +0100
Changed-By: Gianfranco Costamagna <locutusofborg at debian.org>
Maintainer: Debian GNOME Maintainers <pkg-gnome-maintainers at lists.alioth.debian.org>
https://launchpad.net/ubuntu/+source/vino/3.22.0-7ubuntu1
-------------- next part --------------
Format: 1.8
Date: Sun, 22 Dec 2024 23:51:59 +0100
Source: vino
Built-For-Profiles: noudeb
Architecture: source
Version: 3.22.0-7ubuntu1
Distribution: plucky
Urgency: low
Maintainer: Debian GNOME Maintainers <pkg-gnome-maintainers at lists.alioth.debian.org>
Changed-By: Gianfranco Costamagna <locutusofborg at debian.org>
Changes:
 vino (3.22.0-7ubuntu1) plucky; urgency=low
 .
   * Merge from Debian unstable. Remaining changes:
   * SECURITY UPDATE: Denial of service
     - debian/patches/CVE-2020-25708.patch: fix possible divide-by-zero in
       server/libvncserver/rfbserver.c.
     - CVE-2020-25708
   * Fix build with newer libminiupnpc18
   * SECURITY UPDATE: NULL pointer dereference
     - debian/patches/CVE-2020-14397.patch: add missing NULL pointer checks
       in server/libvncserver/rfbregion.c, server/libvncserver/rfbserver.c.
     - CVE-2020-14397
   * SECURITY UPDATE: out-of-bounds access via encodings
     - debian/patches/CVE-2020-1440x.patch: prevent OOB accesses in
       server/libvncserver/corre.c, server/libvncserver/hextile.c,
       server/libvncserver/rre.c.
     - CVE-2020-14402
     - CVE-2020-14403
     - CVE-2020-14404
   * Sync with Debian. Remaining change:
     - debian/control, debian/patches/05_use-system-miniupnpc.patch:
       + Build with system miniupnpc library
Checksums-Sha1:
 04bcf66e474353d4ad7abd06218d75ee23815761 2529 vino_3.22.0-7ubuntu1.dsc
 e2c0fa2fd7f74da66f5aec5033fd6541a8e5c485 768716 vino_3.22.0.orig.tar.xz
 a76c4a557e822a4f0a4374b339e211ffa6f1d358 21444 vino_3.22.0-7ubuntu1.debian.tar.xz
 2b9ba81356571ce064e3265a9126267d77790bf0 10080 vino_3.22.0-7ubuntu1_source.buildinfo
Checksums-Sha256:
 cc64f88d1761808d26ce196e15e02ad14723ec02ee3c3c8fe439715d41c6f63d 2529 vino_3.22.0-7ubuntu1.dsc
 2911c779b6a2c46e5bc8e5a0c94c2a4d5bd4a1ee7e35f2818702cb13d9d23bab 768716 vino_3.22.0.orig.tar.xz
 0872f52517dfc7409633ca42e8a1f237b6b50cc9efd2138d7b3024e2eb0de986 21444 vino_3.22.0-7ubuntu1.debian.tar.xz
 e66ebb54f305a8207a6e876144e968aa6b20a2f330c68ef5492959e7c36456df 10080 vino_3.22.0-7ubuntu1_source.buildinfo
Files:
 250d4d4335962db9c86fde610dfd10cd 2529 gnome optional vino_3.22.0-7ubuntu1.dsc
 7305feaa5cc9acb788d7a13389922012 768716 gnome optional vino_3.22.0.orig.tar.xz
 ad61a41bafcf4c0c932d226c8f15214b 21444 gnome optional vino_3.22.0-7ubuntu1.debian.tar.xz
 b170368cd7c8bf7aff25b004e4ab209b 10080 gnome optional vino_3.22.0-7ubuntu1_source.buildinfo


More information about the plucky-changes mailing list