Mageia 2023-0318: freerdp security update
Summary
This issue affects Clients only: Integer underflow leading to DOS (e.g.
abort due to `WINPR_ASSERT` with default compilation flags). When an
insufficient blockLen is provided, and proper length validation is not
performed, an Integer Underflow occurs, leading to a Denial of Service
(DOS) vulnerability. (CVE-2023-39350)
Affected versions of FreeRDP are subject to a Null Pointer Dereference
leading a crash in the RemoteFX (rfx) handling. Inside the
`rfx_process_message_tileset` function, the program allocates tiles
using `rfx_allocate_tiles` for the number of numTiles. If the
initialization process of tiles is not completed for various reasons,
tiles will have a NULL pointer. Which may be accessed in further
processing and would cause a program crash. (CVE-2023-39351)
Affected versions are subject to a missing o...
References
- https://bugs.mageia.org/show_bug.cgi?id=32360
- https://ubuntu.com/security/notices/USN-6401-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39350
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39351
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39353
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39354
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40181
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40186
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40188
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40567
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40569
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40589
Resolution
MGASA-2023-0318 - Updated freerdp packages fix security vulnerabilities
SRPMS
- 9/core/freerdp-2.10.0-2.1.mga9
- 8/core/freerdp-2.9.0-1.2.mga8