This is an automated email from the ASF dual-hosted git repository.
mjumper pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/guacamole-website.git
The following commit(s) were added to refs/heads/asf-site by this push:
new 2a195f8c Deploy announcement of vulnerabilities fixed in 1.5.2.
2a195f8c is described below
commit 2a195f8c5b5d25812281fcb34623cec5d9e237d6
Author: Michael Jumper <[email protected]>
AuthorDate: Tue Jun 6 10:22:43 2023 -0700
Deploy announcement of vulnerabilities fixed in 1.5.2.
---
content/security/index.html | 36 ++++++++++++++++++++++++++++++++++++
1 file changed, 36 insertions(+)
diff --git a/content/security/index.html b/content/security/index.html
index 6100bfcd..ddd25562 100644
--- a/content/security/index.html
+++ b/content/security/index.html
@@ -426,6 +426,42 @@ discussing the issue in a public forum.</p>
<p>No, CVE-2021-44228 does not affect Apache Guacamole. Guacamole uses
<a href="http://logback.qos.ch/">Logback</a> as its logging backend, not
Log4j.</p>
+<h2 id="fixed-in-apache-guacamole-152">Fixed in Apache Guacamole 1.5.2</h2>
+<ul>
+
+ <li>
+ <h3 id="CVE-2023-30575">
+ Incorrect calculation of Guacamole protocol element lengths
+ (<a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30575">CVE-2023-30575</a>)
+ </h3>
+ <p>Apache Guacamole 1.5.1 and older may incorrectly calculate the
lengths of
+instruction elements sent during the Guacamole protocol handshake, potentially
+allowing an attacker to inject Guacamole instructions during the handshake
+through specially-crafted data.</p>
+
+<p>Acknowledgements: We would like to thank Stefan Schiller (Sonar) for
reporting
+this issue.</p>
+
+
+ </li>
+
+ <li>
+ <h3 id="CVE-2023-30576">
+ Use-after-free in handling of RDP audio input buffer
+ (<a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30576">CVE-2023-30576</a>)
+ </h3>
+ <p>Apache Guacamole 0.9.10 through 1.5.1 may continue to reference
a freed RDP
+audio input buffer. Depending on timing, this may allow an attacker to execute
+arbitrary code with the privileges of the guacd process.</p>
+
+<p>Acknowledgements: We would like to thank Stefan Schiller (Sonar) for
reporting
+this issue.</p>
+
+
+ </li>
+
+</ul>
+
<h2 id="fixed-in-apache-guacamole-140">Fixed in Apache Guacamole 1.4.0</h2>
<ul>