Source: deskflow
X-Debbugs-CC: [email protected]
Severity: important
Tags: security

Hi,

The following vulnerability was published for deskflow.

CVE-2026-41476[0]:
| Deskflow is a keyboard and mouse sharing app.  Prior to 1.26.0.138,
| a remote memory-safety vulnerability in Deskflow's clipboard
| deserialization allows a connected peer to trigger an out-of-bounds
| read by sending a malformed clipboard update. The issue is in the
| implementation of src/lib/deskflow/IClipboard.cpp. This is reachable
| because ClipboardChunk::assemble() in
| src/lib/deskflow/ClipboardChunk.cpp validates only the outer
| clipboard transfer size. It does not validate the internal structure
| of the serialized clipboard blob, so malformed inner lengths reach
| IClipboard::unmarshall() unchanged. This vulnerability is fixed in
| 1.26.0.138.

https://github.com/deskflow/deskflow/security/advisories/GHSA-3jp5-g964-cgmh


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-41476
    https://www.cve.org/CVERecord?id=CVE-2026-41476

Please adjust the affected versions in the BTS as needed.

Reply via email to