freerdp-2.11.7-1.el9

エラータID: AXSA:2024-9208:05

Release date: 
Thursday, December 12, 2024 - 13:51
Subject: 
freerdp-2.11.7-1.el9
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
Moderate
Description: 

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.

Security Fix(es):

* freerdp: Integer Overflow leading to Heap Overflow in freerdp_bitmap_planar_context_reset (CVE-2024-22211)
* freerdp: out-of-bounds read in ncrush_decompress (CVE-2024-32459)
* freerdp: OutOfBound Read in interleaved_decompress (CVE-2024-32460)
* freerdp: Integer overflow & OutOfBound Write in clear_decompress_residual_data (CVE-2024-32039)
* freerdp: integer underflow in nsc_rle_decode (CVE-2024-32040)
* freerdp: OutOfBound Read in zgfx_decompress_segment (CVE-2024-32041)
* freerdp: OutOfBound Read in planar_skip_plane_rle (CVE-2024-32458)
* freerdp: out-of-bounds read (CVE-2024-32662)
* FreeRDP: ExtractRunLengthRegular* out of bound read (CVE-2024-32658)
* freerdp: zgfx_decompress out of memory (CVE-2024-32660)
* freerdp: freerdp_image_copy out of bound read (CVE-2024-32659)
* freerdp: rdp_write_logon_info_v1 NULL access (CVE-2024-32661)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the MIRACLE LINUX 9.5 Release Notes linked from the References section.

CVE-2024-22211
FreeRDP is a set of free and open source remote desktop protocol library and clients. In affected versions an integer overflow in `freerdp_bitmap_planar_context_reset` leads to heap-buffer overflow. This affects FreeRDP based clients. FreeRDP based server implementations and proxy are not affected. A malicious server could prepare a `RDPGFX_RESET_GRAPHICS_PDU` to allocate too small buffers, possibly triggering later out of bound read/write. Data extraction over network is not possible, the buffers are used to display an image. This issue has been addressed in version 2.11.5 and 3.2.0. Users are advised to upgrade. there are no know workarounds for this vulnerability.
CVE-2024-32039
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients using a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to integer overflow and out-of-bounds write. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, do not use `/gfx` options (e.g. deactivate with `/bpp:32` or `/rfx` as it is on by default).
CVE-2024-32040
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 and have connections to servers using the `NSC` codec are vulnerable to integer underflow. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, do not use the NSC codec (e.g. use `-nsc`).
CVE-2024-32041
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, deactivate `/gfx` (on by default, set `/bpp` or `/rfx` options instead.
CVE-2024-32458
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, use `/gfx` or `/rfx` modes (on by default, require server side support).
CVE-2024-32459
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients and servers that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. No known workarounds are available.
CVE-2024-32460
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based based clients using `/bpp:32` legacy `GDI` drawing path with a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, use modern drawing paths (e.g. `/rfx` or `/gfx` options). The workaround requires server side support.
CVE-2024-32658
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read. Version 3.5.1 contains a patch for the issue. No known workarounds are available.
CVE-2024-32659
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read if `((nWidth == 0) and (nHeight == 0))`. Version 3.5.1 contains a patch for the issue. No known workarounds are available.
CVE-2024-32660
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.5.1, a malicious server can crash the FreeRDP client by sending invalid huge allocation size. Version 3.5.1 contains a patch for the issue. No known workarounds are available.
CVE-2024-32661
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to a possible `NULL` access and crash. Version 3.5.1 contains a patch for the issue. No known workarounds are available.
CVE-2024-32662
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read. This occurs when `WCHAR` string is read with twice the size it has and converted to `UTF-8`, `base64` decoded. The string is only used to compare against the redirection server certificate. Version 3.5.1 contains a patch for the issue. No known workarounds are available.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. freerdp-2.11.7-1.el9.src.rpm
    MD5: 96f128bf1cc031792b46c76cc8462b4f
    SHA-256: c454577731b3311ffc9a9e534848fdd247c0de93a74bd63e76644dfc6dc8f26f
    Size: 6.99 MB

Asianux Server 9 for x86_64
  1. freerdp-2.11.7-1.el9.x86_64.rpm
    MD5: 06dc36e57fbb02091eeb430bcde4f3da
    SHA-256: 07cd06bc1dea93ddfe4af1382ae172145ba53d43eabf74dc965d4fb43e1baf7c
    Size: 112.23 kB
  2. freerdp-devel-2.11.7-1.el9.i686.rpm
    MD5: aa384b601e1b39e9aaaf7d51102f3280
    SHA-256: 67c9b7bcc4992c20975cce606c66891a6e8ed2567cb36090578435b6e461a54a
    Size: 176.08 kB
  3. freerdp-devel-2.11.7-1.el9.x86_64.rpm
    MD5: 7bbaaa5ce7171b074ff87e2e862b019b
    SHA-256: 62d1cf1aff2c4dbb9cc7f21aef3c40332ff75ca4a9965a938b6bd41614d5776c
    Size: 176.02 kB
  4. freerdp-libs-2.11.7-1.el9.i686.rpm
    MD5: fb4b69bccdd5dc7adb967d00161030fc
    SHA-256: 8c5c1d78c22150b6119b2247d336dde2f8f70ee9404630f8cb35373cadce0bdf
    Size: 855.97 kB
  5. freerdp-libs-2.11.7-1.el9.x86_64.rpm
    MD5: 58eb344feee22ef0f2effc3129075566
    SHA-256: d440956a80945c9fb96f5b5e2d878dfd94beee289bbc8738c60db763ec868979
    Size: 907.73 kB
  6. libwinpr-2.11.7-1.el9.i686.rpm
    MD5: 2bf17b85e19352fa1a4ef1b84e3f89e2
    SHA-256: f54b0c8c4eed312544b7f75a1ccf5af02997601d25346168f7b33ea69d94dc62
    Size: 340.54 kB
  7. libwinpr-2.11.7-1.el9.x86_64.rpm
    MD5: 63caf32a7bdada63a2cf30078625d31f
    SHA-256: 711d8db5b57bdb623b384dce496785fd090cb4f085a6bf6182ce3c2cc261dd68
    Size: 354.32 kB
  8. libwinpr-devel-2.11.7-1.el9.i686.rpm
    MD5: 8e143029a7cdb75dcad02e2b9ff96c04
    SHA-256: 11ed6fd536612e0663cef883543ec5c0015895fe6b47b2466f8eec4d3fb8a27b
    Size: 181.86 kB
  9. libwinpr-devel-2.11.7-1.el9.x86_64.rpm
    MD5: c9b189e18178313c0626a3b0ffb6e5bc
    SHA-256: 7621aad8ef2fe6a21d04abc4f633aee249349d675ace362b194abc32e651c695
    Size: 181.85 kB