Fedora 38: freerdp 2024-c702ea0fb1 Security Advisory Updates
Summary
The xfreerdp & wlfreerdp Remote Desktop Protocol (RDP) clients from the FreeRDP
project.
xfreerdp & wlfreerdp can connect to RDP servers such as Microsoft Windows
machines, xrdp and VirtualBox.
Update Information:
Update to 2.11.7 (CVE-2024-32039, CVE-2024-32040, CVE-2024-32041, CVE-2024-32458, CVE-2024-32459, CVE-2024-32460, CVE-2024-32658, CVE-2024-32659, CVE-2024-32660, CVE-2024-32661, CVE-2024-32662)
Change Log
* Tue Apr 23 2024 Ondrej Holy
References
[ 1 ] Bug #2276721 - CVE-2024-32459 freerdp: out-of-bounds read in ncrush_decompress https://bugzilla.redhat.com/show_bug.cgi?id=2276721 [ 2 ] Bug #2276722 - CVE-2024-32460 freerdp: OutOfBound Read in interleaved_decompress https://bugzilla.redhat.com/show_bug.cgi?id=2276722 [ 3 ] Bug #2276723 - CVE-2024-32039 freerdp: Integer overflow & OutOfBound Write in clear_decompress_residual_data https://bugzilla.redhat.com/show_bug.cgi?id=2276723 [ 4 ] Bug #2276724 - CVE-2024-32040 freerdp: integer underflow in nsc_rle_decode https://bugzilla.redhat.com/show_bug.cgi?id=2276724 [ 5 ] Bug #2276725 - CVE-2024-32041 freerdp: OutOfBound Read in zgfx_decompress_segment https://bugzilla.redhat.com/show_bug.cgi?id=2276725 [ 6 ] Bug #2276726 - CVE-2024-32458 freerdp: OutOfBound Read in planar_skip_plane_rle https://bugzilla.redhat.com/show_bug.cgi?id=2276726 [ 7 ] Bug #2276804 - CVE-2024-32662 freerdp: out-of-bounds read https://bugzilla.redhat.com/show_bug.cgi?id=2276804 [ 8 ] Bug #2276961 - CVE-2024-32658 FreeRDP: ExtractRunLengthRegular* out of bound read https://bugzilla.redhat.com/show_bug.cgi?id=2276961 [ 9 ] Bug #2276968 - CVE-2024-32660 freerdp: zgfx_decompress out of memory https://bugzilla.redhat.com/show_bug.cgi?id=2276968 [ 10 ] Bug #2276970 - CVE-2024-32659 freerdp: freerdp_image_copy out of bound read https://bugzilla.redhat.com/show_bug.cgi?id=2276970 [ 11 ] Bug #2276971 - CVE-2024-32661 freerdp: rdp_write_logon_info_v1 NULL access https://bugzilla.redhat.com/show_bug.cgi?id=2276971
Update Instructions
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2024-c702ea0fb1' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label