Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in freerdp
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in freerdp
ID: RHSA-2024:2208
Distribution: Red Hat
Plattformen: Red Hat Enterprise Linux CRB (v. 9), Red Hat Enterprise Linux AppStream (v. 9)
Datum: Mi, 1. Mai 2024, 21:47
Referenzen: https://access.redhat.com/security/cve/CVE-2023-40181
https://bugzilla.redhat.com/show_bug.cgi?id=2236779
https://access.redhat.com/security/cve/CVE-2023-40589
https://issues.redhat.com/browse/RHEL-10060
https://bugzilla.redhat.com/show_bug.cgi?id=2236774
https://access.redhat.com/security/cve/CVE-2023-39350
https://access.redhat.com/security/cve/CVE-2023-39352
https://access.redhat.com/security/cve/CVE-2023-40569
https://access.redhat.com/security/cve/CVE-2023-39354
https://access.redhat.com/security/cve/CVE-2023-39353
https://access.redhat.com/security/cve/CVE-2023-39351
https://bugzilla.redhat.com/show_bug.cgi?id=2236763
https://bugzilla.redhat.com/show_bug.cgi?id=2236730
https://access.redhat.com/security/cve/CVE-2023-39356
https://bugzilla.redhat.com/show_bug.cgi?id=2236669
https://bugzilla.redhat.com/show_bug.cgi?id=2236656
https://access.redhat.com/security/cve/CVE-2023-40188
https://bugzilla.redhat.com/show_bug.cgi?id=2236759
https://bugzilla.redhat.com/show_bug.cgi?id=2236766
https://access.redhat.com/security/cve/CVE-2023-40567
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index
https://bugzilla.redhat.com/show_bug.cgi?id=2236750
https://bugzilla.redhat.com/show_bug.cgi?id=2236650
https://bugzilla.redhat.com/show_bug.cgi?id=2236784
https://bugzilla.redhat.com/show_bug.cgi?id=2236606
https://access.redhat.com/security/cve/CVE-2023-40186
https://access.redhat.com/errata/RHSA-2024:2208
Applikationen: FreeRDP

Originalnachricht

An update for freerdp is now available for Red Hat Enterprise Linux 9.

Red Hat Product Security has rated this update as having a security impact of
Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released
under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.

Security Fix(es):

* freerdp: Incorrect offset calculation leading to DOS (CVE-2023-39350)

* freerdp: Null Pointer Dereference leading DOS in RemoteFX (CVE-2023-39351)

* freerdp: invalid offset validation leading to Out Of Bound Write
(CVE-2023-39352)

* freerdp: missing offset validation leading to Out-of-Bounds Read in
gdi_multi_opaque_rect (CVE-2023-39356)

* freerdp: Integer overflow leading to out-of-bound write vulnerability in
gdi_CreateSurface (CVE-2023-40186)

* freerdp: Out-of-bounds write in clear_decompress_bands_data (CVE-2023-40567)

* freerdp: Out-of-bounds write in the `progressive_decompress` function due to
incorrect calculations (CVE-2023-40569)

* freerdp: buffer overflow in ncrush_decompress causes crash with crafted input
(CVE-2023-40589)

* freerdp: missing offset validation leading to Out Of Bound Read
(CVE-2023-39353)

* freerdp: Out-Of-Bounds Read in nsc_rle_decompress_data (CVE-2023-39354)

* freerdp: integer-Underflow leading to Out-Of-Bound Read in
zgfx_decompress_segment (CVE-2023-40181)

* freerdp: Out-of-bounds read in general_LumaToYUV444 (CVE-2023-40188)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise
Linux 9.4 Release Notes linked from the References section.

This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

CVE-2023-39350: Integer Underflow (Wrap or Wraparound) (CWE-191)
CVE-2023-39351: NULL Pointer Dereference (CWE-476)
CVE-2023-39352: Out-of-bounds Write (CWE-787)
CVE-2023-39353: Out-of-bounds Read (CWE-125)
CVE-2023-39354: Out-of-bounds Read (CWE-125)
CVE-2023-39356: Out-of-bounds Read (CWE-125)
CVE-2023-40181: Integer Underflow (Wrap or Wraparound) (CWE-191)
CVE-2023-40186: Out-of-bounds Write (CWE-787)
CVE-2023-40188: Out-of-bounds Read (CWE-125)
CVE-2023-40567: Out-of-bounds Write (CWE-787)
CVE-2023-40569: Out-of-bounds Write (CWE-787)
CVE-2023-40589: Buffer Copy without Checking Size of Input ('Classic Buffer
Overflow') (CWE-120)
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung