Source: freerdp2 Version: 2.11.5+dfsg1-1 Severity: grave Tags: security upstream Justification: user security hole X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerabilities were published for freerdp2. CVE-2024-32039[0]: | FreeRDP is a free implementation of the Remote Desktop Protocol. | FreeRDP based clients using a version of FreeRDP prior to 3.5.0 or | 2.11.6 are vulnerable to integer overflow and out-of-bounds write. | Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, do not | use `/gfx` options (e.g. deactivate with `/bpp:32` or `/rfx` as it | is on by default). CVE-2024-32040[1]: | FreeRDP is a free implementation of the Remote Desktop Protocol. | FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 | or 2.11.6 and have connections to servers using the `NSC` codec are | vulnerable to integer underflow. Versions 3.5.0 and 2.11.6 patch the | issue. As a workaround, do not use the NSC codec (e.g. use `-nsc`). CVE-2024-32041[2]: | FreeRDP is a free implementation of the Remote Desktop Protocol. | FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 | or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and | 2.11.6 patch the issue. As a workaround, deactivate `/gfx` (on by | default, set `/bpp` or `/rfx` options instead. CVE-2024-32458[3]: | FreeRDP is a free implementation of the Remote Desktop Protocol. | FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 | or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and | 2.11.6 patch the issue. As a workaround, use `/gfx` or `/rfx` modes | (on by default, require server side support). CVE-2024-32459[4]: | FreeRDP is a free implementation of the Remote Desktop Protocol. | FreeRDP based clients and servers that use a version of FreeRDP | prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. | Versions 3.5.0 and 2.11.6 patch the issue. No known workarounds are | available. CVE-2024-32460[5]: | FreeRDP is a free implementation of the Remote Desktop Protocol. | FreeRDP based based clients using `/bpp:32` legacy `GDI` drawing | path with a version of FreeRDP prior to 3.5.0 or 2.11.6 are | vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch | the issue. As a workaround, use modern drawing paths (e.g. `/rfx` or | `/gfx` options). The workaround requires server side support. If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2024-32039 https://www.cve.org/CVERecord?id=CVE-2024-32039 [1] https://security-tracker.debian.org/tracker/CVE-2024-32040 https://www.cve.org/CVERecord?id=CVE-2024-32040 [2] https://security-tracker.debian.org/tracker/CVE-2024-32041 https://www.cve.org/CVERecord?id=CVE-2024-32041 [3] https://security-tracker.debian.org/tracker/CVE-2024-32458 https://www.cve.org/CVERecord?id=CVE-2024-32458 [4] https://security-tracker.debian.org/tracker/CVE-2024-32459 https://www.cve.org/CVERecord?id=CVE-2024-32459 [5] https://security-tracker.debian.org/tracker/CVE-2024-32460 https://www.cve.org/CVERecord?id=CVE-2024-32460 [6] https://www.freerdp.com/2024/04/17/2_11_6-release Regards, Salvatore