Your message dated Mon, 26 May 2025 13:04:28 +0000
with message-id <e1ujxve-008zmg...@fasolo.debian.org>
and subject line Bug#1105917: fixed in freerdp3 3.15.0+dfsg-2.1
has caused the Debian Bug report #1105917,
regarding freerdp3: CVE-2025-4478
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
1105917: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105917
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: gnome-remote-desktop
Version: 48.1-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi,
The following vulnerability was published for gnome-remote-desktop.
CVE-2025-4478[0]:
| A flaw was found in the gnome-remote-desktop used by Anaconda's
| remote install feature, where a crafted RDP packet could trigger a
| segmentation fault. This issue causes the service to crash and
| remain defunct, resulting in a denial of service. It occurs pre-boot
| and is likely due to a NULL pointer dereference. Rebooting is
| required to recover the system.
I'm not entirely sure about this one, the reference is given to the RH
Bugzilla to [1] and it might relate to the issues reported in [2]. Do
you happend to know more about this assignment?
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2025-4478
https://www.cve.org/CVERecord?id=CVE-2025-4478
[1] https://bugzilla.redhat.com/show_bug.cgi?id=2365232
[2] https://gitlab.gnome.org/GNOME/gnome-remote-desktop/-/issues/196
Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: freerdp3
Source-Version: 3.15.0+dfsg-2.1
Done: Daniel Baumann <dan...@debian.org>
We believe that the bug you reported is fixed in the latest version of
freerdp3, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 1105...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Daniel Baumann <dan...@debian.org> (supplier of updated freerdp3 package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Mon, 26 May 2025 14:38:19 +0200
Source: freerdp3
Architecture: source
Version: 3.15.0+dfsg-2.1
Distribution: unstable
Urgency: medium
Maintainer: Debian Remote Maintainers <debian-rem...@lists.debian.org>
Changed-By: Daniel Baumann <dan...@debian.org>
Closes: 1105917
Changes:
freerdp3 (3.15.0+dfsg-2.1) unstable; urgency=medium
.
* Non-maintainer upload.
* Cherry-picking patch from upstream:
- A flaw was found where a crafted RDP packet could trigger a segmentation
fault. This causes FreeRDP to crash and remain defunct, resulting in a
denial of service. Initializing function pointers in transport.c after
resource allocation fixes this [CVE-2025-4478] (Closes: #1105917).
Checksums-Sha1:
4730635957760e4a3459f5abbca77875a184a4dc 3507 freerdp3_3.15.0+dfsg-2.1.dsc
49f8f85ed62fe13cd14aa8a0dfa8646a72b4c6cb 57368
freerdp3_3.15.0+dfsg-2.1.debian.tar.xz
6f9134ee122c9f3321b5f57954326ecf450a4c2f 26210
freerdp3_3.15.0+dfsg-2.1_amd64.buildinfo
Checksums-Sha256:
2c4f8257491193f4a54b4a865e019cb4ca7c4d644b9e94d5d26f6391b7846a0d 3507
freerdp3_3.15.0+dfsg-2.1.dsc
dfda6d020a9b6bfb4812e354c31f1de694c33284d8bbea4ec7c0b878b66fa5c7 57368
freerdp3_3.15.0+dfsg-2.1.debian.tar.xz
44306448b8b7bca22ebe85c40cb3f9f330701c7d2bf9a882e336cc2f52dcfe09 26210
freerdp3_3.15.0+dfsg-2.1_amd64.buildinfo
Files:
ceaaa41b5faf986abc2b8031e5881b83 3507 x11 optional freerdp3_3.15.0+dfsg-2.1.dsc
253871191f2d69b0a6c5ae709f1883fe 57368 x11 optional
freerdp3_3.15.0+dfsg-2.1.debian.tar.xz
e623d245ef209bd95fd29e5f733be768 26210 x11 optional
freerdp3_3.15.0+dfsg-2.1_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----
iHUEARYKAB0WIQQmmGg4gLaoSj0ERgL7tPDoCoAiLwUCaDRiOgAKCRD7tPDoCoAi
L+ORAQDHJSdlhyaihlKF/mWqLYBWab/iCO038MWmRqwsdFS2UwD/fI5vBARQ43mm
vpFHlkfY2NF0U5ZzU9PledR5OOn9wAk=
=1Ka7
-----END PGP SIGNATURE-----
pgp4Qam8UswlO.pgp
Description: PGP signature
--- End Message ---