| Message ID | 20260120064803.831507-3-skandigraun@gmail.com |
|---|---|
| State | New |
| Headers | show |
| Series | [meta-oe,kirkstone,1/5] freerdp: patch CVE-2022-24883 | expand |
diff --git a/meta-oe/recipes-support/freerdp/freerdp/CVE-2022-39316.patch b/meta-oe/recipes-support/freerdp/freerdp/CVE-2022-39316.patch index a60b2854c8..d13ad42958 100644 --- a/meta-oe/recipes-support/freerdp/freerdp/CVE-2022-39316.patch +++ b/meta-oe/recipes-support/freerdp/freerdp/CVE-2022-39316.patch @@ -1,5 +1,5 @@ https://github.com/FreeRDP/FreeRDP/commit/e865c24efc40ebc52e75979c94cdd4ee2c1495b0 -CVE: CVE-2022-39316 +CVE: CVE-2022-39316 CVE-2022-39317 Upstream-Status: Backport Signed-off-by: Lee Chee Yang <chee.yang.lee@intel.com>
Details: https://nvd.nist.gov/vuln/detail/CVE-2022-39317 Both Ubuntu[1] and Red Hat[2] confirms that this vulenrability is fixed by the same patch as CVE-2022-39316. Therefore add this CVE ID to the patch's tag also. [1]: https://ubuntu.com/security/CVE-2022-39317 [2]: https://bugzilla.redhat.com/show_bug.cgi?id=2143643 Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com> --- meta-oe/recipes-support/freerdp/freerdp/CVE-2022-39316.patch | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)