Package "freerdp2"
| Name: |
freerdp2
|
Description: |
This package is just an umbrella for a group of other packages,
it has no description. Description samples from packages in group:
- Free Remote Desktop Protocol library (development files)
- Free Remote Desktop Protocol library (client library)
- Free Remote Desktop Protocol library (server library)
- FreeRDP Remote Desktop Protocol shadow subsystem libraries
|
| Latest version: |
2.6.1+dfsg1-3ubuntu2.8 |
| Release: |
jammy (22.04) |
| Level: |
security |
| Repository: |
main |
Links
Other versions of "freerdp2" in Jammy
Packages in group
Deleted packages are displayed in grey.
Changelog
|
freerdp2 (2.6.1+dfsg1-3ubuntu2.8) jammy-security; urgency=medium
* SECURITY UPDATE: Buffer Overflow
- debian/patches/CVE-2026-23530.patch: Fix decoder length checks
- debian/patches/CVE-2026-23531-1.patch: Fix missing length checks
- debian/patches/CVE-2026-23531-2.patch: check clear_decomress glyphData
- debian/patches/CVE-2026-23532.patch: Properly clamp SurfaceToSurface
- debian/patches/CVE-2026-23533.patch: Fix clear_resize_buffer checks
- debian/patches/CVE-2026-23534.patch: Fix off by one length check
- CVE-2026-23530
- CVE-2026-23531
- CVE-2026-23532
- CVE-2026-23533
- CVE-2026-23534
-- Bruce Cable <email address hidden> Mon, 02 Feb 2026 13:27:19 +1100
|
| Source diff to previous version |
| CVE-2026-23530 |
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0,`freerdp_bitmap_decompress_planar` does not validate `nSrcWi |
| CVE-2026-23531 |
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, in ClearCodec, when `glyphData` is present, `clear_decompre |
| CVE-2026-23532 |
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, a client-side heap buffer overflow occurs in the FreeRDP c |
| CVE-2026-23533 |
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, a client-side heap buffer overflow occurs in the RDPGFX Cle |
| CVE-2026-23534 |
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, a client-side heap buffer overflow occurs in the ClearCodec |
|
|
freerdp2 (2.6.1+dfsg1-3ubuntu2.7) jammy-security; urgency=medium
* SECURITY UPDATE: out-of-bounds read
- debian/patches/CVE-2024-32658.patch: fix offset error in
libfreerdp/codec/interleaved.c.
- CVE-2024-32658
* SECURITY UPDATE: out-of-bounds read
- debian/patches/CVE-2024-32659.patch: fix out of bound read in
libfreerdp/codec/color.c.
- CVE-2024-32659
* SECURITY UPDATE: crash via invalid huge allocation size
- debian/patches/CVE-2024-32660.patch: allocate in segment steps in
libfreerdp/codec/zgfx.c.
- CVE-2024-32660
* SECURITY UPDATE: NULL access and crash
- debian/patches/CVE-2024-32661.patch: fix missing check in
rdp_write_logon_info_v1 in libfreerdp/core/info.c.
- CVE-2024-32661
-- Marc Deslauriers <email address hidden> Thu, 25 Apr 2024 07:35:20 -0400
|
| Source diff to previous version |
| CVE-2024-32658 |
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read. V |
| CVE-2024-32659 |
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read if |
| CVE-2024-32660 |
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.5.1, a malicious server can crash the FreeRDP client by sending i |
| CVE-2024-32661 |
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to a possible `NULL` acc |
|
|
freerdp2 (2.6.1+dfsg1-3ubuntu2.6) jammy-security; urgency=medium
* SECURITY UPDATE: integer overflow in freerdp_bitmap_planar_context_reset
- debian/patches/CVE-2024-22211.patch: check resolution for overflow in
libfreerdp/codec/planar.c.
- CVE-2024-22211
* SECURITY UPDATE: out-of-bounds write and out-of-bounds read
- debian/patches/CVE-2024-32039_41.patch: reorder check to prevent
possible integer overflow in libfreerdp/codec/clear.c,
libfreerdp/codec/zgfx.c.
- CVE-2024-32039
- CVE-2024-32041
* SECURITY UPDATE: integer underflow in NSC codec
- debian/patches/CVE-2024-32040.patch: abort if there are more bytes to
be read then there are left in libfreerdp/codec/nsc.c.
- CVE-2024-32040
* SECURITY UPDATE: out-of-bounds read
- debian/patches/CVE-2024-32458.patch: fix missing input length checks
in libfreerdp/codec/planar.c.
- CVE-2024-32458
* SECURITY UPDATE: out-of-bounds read
- debian/patches/CVE-2024-32459.patch: fix missing input length check
in libfreerdp/codec/ncrush.c.
- CVE-2024-32459
* SECURITY UPDATE: out-of-bounds read
- debian/patches/CVE-2024-32460.patch: add checks to
libfreerdp/codec/include/bitmap.c, libfreerdp/codec/interleaved.c.
- CVE-2024-32460
-- Marc Deslauriers <email address hidden> Tue, 23 Apr 2024 10:58:50 -0400
|
| Source diff to previous version |
| CVE-2024-22211 |
FreeRDP is a set of free and open source remote desktop protocol library and clients. In affected versions an integer overflow in `freerdp_bitmap_pla |
| CVE-2024-32039 |
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients using a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulner |
| CVE-2024-32041 |
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vul |
| CVE-2024-32040 |
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 and hav |
| CVE-2024-32458 |
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vul |
| CVE-2024-32459 |
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients and servers that use a version of FreeRDP prior to 3.5.0 or 2. |
| CVE-2024-32460 |
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based based clients using `/bpp:32` legacy `GDI` drawing path with a version |
|
|
freerdp2 (2.6.1+dfsg1-3ubuntu2.5) jammy-security; urgency=medium
* SECURITY UPDATE: missing input length validation in drive channel
- debian/patches/CVE-2022-41877.patch: fixed missing stream length
check in channels/drive/client/drive_main.c.
- CVE-2022-41877
* SECURITY UPDATE: OOB write via invalid offset validation
- debian/patches/CVE-2023-39352.patch: add bound check in gdi_SolidFill
in libfreerdp/gdi/gfx.c.
- CVE-2023-39352
* SECURITY UPDATE: OOB read via missing offset validation
- debian/patches/CVE-2023-39356-1.patch: fix checks for multi opaque
rect in libfreerdp/core/orders.c.
- debian/patches/CVE-2023-39356-2.patch: fix reading order number field
in libfreerdp/core/orders.c.
- CVE-2023-39356
-- Marc Deslauriers <email address hidden> Mon, 27 Nov 2023 12:29:39 -0500
|
| Source diff to previous version |
| CVE-2022-41877 |
FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in `drive` channel. A |
|
|
freerdp2 (2.6.1+dfsg1-3ubuntu2.4) jammy-security; urgency=medium
* SECURITY UPDATE: integer underflow
- debian/patches/CVE-2023-39350.patch: validates package length to prevent
possible out of bound read
- CVE-2023-39350
* SECURITY UPDATE: null pointer dereference
- debian/patches/CVE-2023-39351.patch: frees content of currentMessage on
fail to prevent null pointer access when processing next package
- CVE-2023-39351
* SECURITY UPDATE: missing offset validation
- debian/patches/CVE-2023-39353-01.patch: validates offset to prevent
possible out of bound read
- debian/patches/CVE-2023-39353-02.patch: fixes issues with the previous
patch
- CVE-2023-39353
* SECURITY UPDATE: missing input validation
- debian/patches/format_string_for_Stream_CheckAndLogRequiredLength.patch:
backports functionality required by CVE-2023-39354.patch
- debian/patches/CVE-2023-39354.patch: validates input length to prevent
possible out of bound read
- CVE-2023-39354
* SECURITY UPDATE: integer underflow
- debian/patches/CVE-2023-40181.patch: fixes cBitsRemaining calculation to
prevent possible out of bound read
- CVE-2023-40181
* SECURITY UPDATE: integer overflow
- debian/patches/CVE-2023-40186.patch: fixes integer multiplication to
prevent possible out of bound write
- CVE-2023-40186
* SECURITY UPDATE: missing input validation
- debian/patches/ensure_integer_width.patch: ensures integer width
- debian/patches/CVE-2023-40188.patch: validates input length to prevent
possible out of bound read
- CVE-2023-40188
* SECURITY UPDATE: missing offset validation
- debian/patches/CVE-2023-40567.patch: validates offset to prevent
possible out of bound write
- CVE-2023-40567
* SECURITY UPDATE: incorrect parameter calculation
- debian/patches/CVE-2023-40569.patch: fixes nXSrc and nYSrc calculation
to prevent possible out of bound write
- CVE-2023-40569
* SECURITY UPDATE: global buffer overflow
- debian/patches/CVE-2023-40589.patch: fixes index checks
- CVE-2023-40589
-- Jorge Sancho Larraz <email address hidden> Thu, 28 Sep 2023 13:55:11 +0200
|
| CVE-2023-39351 |
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions of FreeRDP are subject to |
| CVE-2023-39353 |
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to a missing |
| CVE-2023-39354 |
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of- |
| CVE-2023-40181 |
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Integer |
| CVE-2023-40186 |
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Integer |
| CVE-2023-40188 |
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of- |
| CVE-2023-40567 |
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of- |
| CVE-2023-40569 |
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of- |
| CVE-2023-40589 |
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions there is a Global-Buff |
|
About
-
Send Feedback to @ubuntu_updates