| Message ID | 20260123064332.4001588-1-skandigraun@gmail.com |
|---|---|
| State | New |
| Headers | show |
| Series | [meta-oe,kirkstone,1/5] freerdp: mark CVE-2024-32041 patched | expand |
diff --git a/meta-oe/recipes-support/freerdp/freerdp/CVE-2024-32039.patch b/meta-oe/recipes-support/freerdp/freerdp/CVE-2024-32039.patch index 4def7320b9..ed12787310 100644 --- a/meta-oe/recipes-support/freerdp/freerdp/CVE-2024-32039.patch +++ b/meta-oe/recipes-support/freerdp/freerdp/CVE-2024-32039.patch @@ -7,7 +7,7 @@ reorder check to prevent possible integer overflow (cherry picked from commit 3a2a241b8fcfee853e35cc54bec00375096fedd9) -CVE: CVE-2024-32039 +CVE: CVE-2024-32039 CVE-2024-32041 Upstream-Status: Backport [https://github.com/FreeRDP/FreeRDP/commit/d88ad1acd142769650a6159906ac90f46a766265] Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com> ---
Details: https://nvd.nist.gov/vuln/detail/CVE-2024-32041 Both the relevant Github Advisory[1] and Debian[2] states that the same patch fixes this vulnerability as CVE-2024-32039. Therefore add this CVE ID to the same patch's CVE tag. [1]: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-5r4p-mfx2-m44r [2]: https://security-tracker.debian.org/tracker/CVE-2024-32041 Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com> --- meta-oe/recipes-support/freerdp/freerdp/CVE-2024-32039.patch | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)