|
|
Subscribe / Log in / New account

Ubuntu alert USN-6749-1 (freerdp2)

From:  Marc Deslauriers <marc.deslauriers@canonical.com>
To:  "ubuntu-security-announce@lists.ubuntu.com" <ubuntu-security-announce@lists.ubuntu.com>
Subject:  [USN-6749-1] FreeRDP vulnerabilities
Date:  Wed, 24 Apr 2024 14:16:32 -0400
Message-ID:  <2d8265f2-d73b-4077-8138-14f0a2f8d95a@canonical.com>

========================================================================== Ubuntu Security Notice USN-6749-1 April 24, 2024 freerdp2 vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 23.10 - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS Summary: Several security issues were fixed in FreeRDP. Software Description: - freerdp2: RDP client for Windows Terminal Services Details: It was discovered that FreeRDP incorrectly handled certain context resets. If a user were tricked into connecting to a malicious server, a remote attacker could use this issue to cause FreeRDP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2024-22211) Evgeny Legerov discovered that FreeRDP incorrectly handled certain memory operations. If a user were tricked into connecting to a malicious server, a remote attacker could use this issue to cause FreeRDP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2024-32039, CVE-2024-32040) Evgeny Legerov discovered that FreeRDP incorrectly handled certain memory operations. If a user were tricked into connecting to a malicious server, a remote attacker could possibly use this issue to cause FreeRDP to crash, resulting in a denial of service. (CVE-2024-32041, CVE-2024-32458, CVE-2024-32460) Evgeny Legerov discovered that FreeRDP incorrectly handled certain memory operations. A remote attacker could possibly use this issue to cause FreeRDP clients and servers to crash, resulting in a denial of service. (CVE-2024-32459) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 23.10: libfreerdp2-2 2.10.0+dfsg1-1.1ubuntu1.2 Ubuntu 22.04 LTS: libfreerdp2-2 2.6.1+dfsg1-3ubuntu2.6 Ubuntu 20.04 LTS: libfreerdp2-2 2.6.1+dfsg1-0ubuntu0.20.04.1 After a standard system update you need to restart your session to make all the necessary changes. References: https://ubuntu.com/security/notices/USN-6749-1 CVE-2024-22211, CVE-2024-32039, CVE-2024-32040, CVE-2024-32041, CVE-2024-32458, CVE-2024-32459, CVE-2024-32460 Package Information: https://launchpad.net/ubuntu/+source/freerdp2/2.10.0+dfsg... https://launchpad.net/ubuntu/+source/freerdp2/2.6.1+dfsg1... https://launchpad.net/ubuntu/+source/freerdp2/2.6.1+dfsg1...


Attachment: OpenPGP_signature.asc (type=application/pgp-signature)

-----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAmYpTIAACgkQZWnYVadE vpPAbBAAoj4MpECGQM9gR6PfIccurfhlaw21h78r1vQ5ADfguRWpGkDvq0OBc1At QMJ45shgb1DG1081bSMi9PwctOVQly5hOr4UndyLS9z5fb+pe8cZoRyPwf6XymkO U4BDTUynqoFMIhrejKpGXm0VFaBpkTZLBxiJAb113fHZqaf/ykPwdkulwupLRVZ+ 9oSTUqPVnD6i8D3Q6nn09skBfGVZr7PWIflKa1jqVwQa3OtNtbgFpX6XmWHSJ84B YJHJS0NsngEdkEXR96ub2UpflLM53vj8wk4dHpks5U2wXF6K3jLOcoC6NNX9Yrhi EaMfg+Gvb+SBexMmRRQixaYAnexmnf0C6aB7Dq+NXmxJfbJoevok6D3MNpVlJzj2 Lr5Nylmoasfo+fpRMpCmmPhliYm9Ks05qI39hYx90340gsi9UVpwJ2SQ8wlGPNM/ sv1Cl1cIHIs2KbL/lxHhlXD1ePDW36Hu8NFWQZEa7JXwPVRfmUpSD3+7aQNxUn4D BxCY0H5rw/e+0Hkk7p+dl+FUGYGntmWQMX5fly6JNxHc3AAafKSbi1UKJxxDAFcW oGVkWLxOb1jgP5bi2M+SWtaH/VAKtCx0w97chkI1tKq9+OtvulIqBTszXHusz+up jruNyjGpl6RY8YYf5fJS0lW97DpV/mD5aUUOcWs1fACNtdKZWZY= =cZ3s -----END PGP SIGNATURE-----


Attachment: None (type=text/plain)


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds