Package "freerdp2-shadow-x11"
  
    
    
        | Name: | 
        freerdp2-shadow-x11
            
         | 
    
    
         Description: | 
        
             FreeRDP x11 shadowing server 
         | 
    
    
        | Latest version: | 
        2.6.1+dfsg1-3ubuntu2.7 | 
    
    
        | Release: | 
        jammy (22.04) | 
    
    
        | Level: | 
        security | 
    
    
        | Repository: | 
        universe | 
    
         
            | Head package: | 
            freerdp2 | 
         
        
            | Homepage: | 
            https://www.freerdp.com/ | 
        
    
   
  
  
 
Links
    Download "freerdp2-shadow-x11"
    
Other versions of "freerdp2-shadow-x11" in Jammy
    
Changelog
    
    
    
        
        
    
    
        | 
               freerdp2 (2.6.1+dfsg1-3ubuntu2.7) jammy-security; urgency=medium 
  * SECURITY UPDATE: out-of-bounds read
     - debian/patches/CVE-2024-32658.patch: fix offset error in
       libfreerdp/codec/interleaved.c.
     - CVE-2024-32658
   * SECURITY UPDATE: out-of-bounds read
     - debian/patches/CVE-2024-32659.patch: fix out of bound read in
       libfreerdp/codec/color.c.
     - CVE-2024-32659
   * SECURITY UPDATE: crash via invalid huge allocation size
     - debian/patches/CVE-2024-32660.patch: allocate in segment steps in
       libfreerdp/codec/zgfx.c.
     - CVE-2024-32660
   * SECURITY UPDATE: NULL access and crash
     - debian/patches/CVE-2024-32661.patch: fix missing check in
       rdp_write_logon_info_v1 in libfreerdp/core/info.c.
     - CVE-2024-32661 
 -- Marc Deslauriers <email address hidden>  Thu, 25 Apr 2024 07:35:20 -0400 
         | 
    
    | Source diff to previous version | 
        
        
            
            
                
                | CVE-2024-32658 | 
                FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read. V | 
                 
                
                | CVE-2024-32659 | 
                FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read if | 
                 
                
                | CVE-2024-32660 | 
                FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.5.1, a malicious server can crash the FreeRDP client by sending i | 
                 
                
                | CVE-2024-32661 | 
                FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to a possible `NULL` acc | 
                 
             
         | 
        
    
    
    
    
    
        
        
    
    
        | 
               freerdp2 (2.6.1+dfsg1-3ubuntu2.6) jammy-security; urgency=medium 
  * SECURITY UPDATE: integer overflow in freerdp_bitmap_planar_context_reset
     - debian/patches/CVE-2024-22211.patch: check resolution for overflow in
       libfreerdp/codec/planar.c.
     - CVE-2024-22211
   * SECURITY UPDATE: out-of-bounds write and out-of-bounds read
     - debian/patches/CVE-2024-32039_41.patch: reorder check to prevent
       possible integer overflow in libfreerdp/codec/clear.c,
       libfreerdp/codec/zgfx.c.
     - CVE-2024-32039
     - CVE-2024-32041
   * SECURITY UPDATE: integer underflow in NSC codec
     - debian/patches/CVE-2024-32040.patch: abort if there are more bytes to
       be read then there are left in libfreerdp/codec/nsc.c.
     - CVE-2024-32040
   * SECURITY UPDATE: out-of-bounds read
     - debian/patches/CVE-2024-32458.patch: fix missing input length checks
       in libfreerdp/codec/planar.c.
     - CVE-2024-32458
   * SECURITY UPDATE: out-of-bounds read
     - debian/patches/CVE-2024-32459.patch: fix missing input length check
       in libfreerdp/codec/ncrush.c.
     - CVE-2024-32459
   * SECURITY UPDATE: out-of-bounds read
     - debian/patches/CVE-2024-32460.patch: add checks to
       libfreerdp/codec/include/bitmap.c, libfreerdp/codec/interleaved.c.
     - CVE-2024-32460 
 -- Marc Deslauriers <email address hidden>  Tue, 23 Apr 2024 10:58:50 -0400 
         | 
    
    | Source diff to previous version | 
        
        
            
            
                
                | CVE-2024-22211 | 
                FreeRDP is a set of free and open source remote desktop protocol library and clients. In affected versions an integer overflow in `freerdp_bitmap_pla | 
                 
                
                | CVE-2024-32039 | 
                FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients using a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulner | 
                 
                
                | CVE-2024-32041 | 
                FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vul | 
                 
                
                | CVE-2024-32040 | 
                FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 and hav | 
                 
                
                | CVE-2024-32458 | 
                FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vul | 
                 
                
                | CVE-2024-32459 | 
                FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients and servers that use a version of FreeRDP prior to 3.5.0 or 2. | 
                 
                
                | CVE-2024-32460 | 
                FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based based clients using `/bpp:32` legacy `GDI` drawing path with a version | 
                 
             
         | 
        
    
    
    
    
    
        
        
    
    
        | 
               freerdp2 (2.6.1+dfsg1-3ubuntu2.5) jammy-security; urgency=medium 
  * SECURITY UPDATE: missing input length validation in drive channel
     - debian/patches/CVE-2022-41877.patch: fixed missing stream length
       check in channels/drive/client/drive_main.c.
     - CVE-2022-41877
   * SECURITY UPDATE: OOB write via invalid offset validation
     - debian/patches/CVE-2023-39352.patch: add bound check in gdi_SolidFill
       in libfreerdp/gdi/gfx.c.
     - CVE-2023-39352
   * SECURITY UPDATE: OOB read via missing offset validation
     - debian/patches/CVE-2023-39356-1.patch: fix checks for multi opaque
       rect in libfreerdp/core/orders.c.
     - debian/patches/CVE-2023-39356-2.patch: fix reading order number field
       in libfreerdp/core/orders.c.
     - CVE-2023-39356 
 -- Marc Deslauriers <email address hidden>  Mon, 27 Nov 2023 12:29:39 -0500 
         | 
    
    | Source diff to previous version | 
        
        
            
            
                
                | CVE-2022-41877 | 
                FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in `drive` channel. A | 
                 
             
         | 
        
    
    
    
    
    
        
        
    
    
        | 
               freerdp2 (2.6.1+dfsg1-3ubuntu2.4) jammy-security; urgency=medium 
  * SECURITY UPDATE: integer underflow
     - debian/patches/CVE-2023-39350.patch: validates package length to prevent
       possible out of bound read
     - CVE-2023-39350
   * SECURITY UPDATE: null pointer dereference
     - debian/patches/CVE-2023-39351.patch: frees content of currentMessage on
       fail to prevent null pointer access when processing next package
     - CVE-2023-39351
   * SECURITY UPDATE: missing offset validation
     - debian/patches/CVE-2023-39353-01.patch: validates offset to prevent
       possible out of bound read
     - debian/patches/CVE-2023-39353-02.patch: fixes issues with the previous
       patch
     - CVE-2023-39353
   * SECURITY UPDATE: missing input validation
     - debian/patches/format_string_for_Stream_CheckAndLogRequiredLength.patch:
       backports functionality required by CVE-2023-39354.patch
     - debian/patches/CVE-2023-39354.patch: validates input length to prevent
       possible out of bound read
     - CVE-2023-39354
   * SECURITY UPDATE: integer underflow
     - debian/patches/CVE-2023-40181.patch: fixes cBitsRemaining calculation to
       prevent possible out of bound read
     - CVE-2023-40181
   * SECURITY UPDATE: integer overflow
     - debian/patches/CVE-2023-40186.patch: fixes integer multiplication to
       prevent possible out of bound write
     - CVE-2023-40186
   * SECURITY UPDATE: missing input validation
     - debian/patches/ensure_integer_width.patch: ensures integer width
     - debian/patches/CVE-2023-40188.patch: validates input length to prevent
       possible out of bound read
     - CVE-2023-40188
   * SECURITY UPDATE: missing offset validation
     - debian/patches/CVE-2023-40567.patch: validates offset to prevent
       possible out of bound write
     - CVE-2023-40567
   * SECURITY UPDATE: incorrect parameter calculation
     - debian/patches/CVE-2023-40569.patch: fixes nXSrc and nYSrc calculation
       to prevent possible out of bound write
     - CVE-2023-40569
   * SECURITY UPDATE: global buffer overflow
     - debian/patches/CVE-2023-40589.patch: fixes index checks
     - CVE-2023-40589 
 -- Jorge Sancho Larraz <email address hidden>  Thu, 28 Sep 2023 13:55:11 +0200 
         | 
    
    | Source diff to previous version | 
        
        
            
            
                
                | CVE-2023-39351 | 
                FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions of FreeRDP are subject to | 
                 
                
                | CVE-2023-39353 | 
                FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to a missing  | 
                 
                
                | CVE-2023-39354 | 
                FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of- | 
                 
                
                | CVE-2023-40181 | 
                FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Integer | 
                 
                
                | CVE-2023-40186 | 
                FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Integer | 
                 
                
                | CVE-2023-40188 | 
                FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of- | 
                 
                
                | CVE-2023-40567 | 
                FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of- | 
                 
                
                | CVE-2023-40569 | 
                FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of- | 
                 
                
                | CVE-2023-40589 | 
                FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions there is a Global-Buff | 
                 
             
         | 
        
    
    
    
    
    
        
        
    
    
        | 
               freerdp2 (2.6.1+dfsg1-3ubuntu2.3) jammy-security; urgency=medium 
  * SECURITY UPDATE: out of bounds read via parallel driver
     - debian/patches/CVE-2022-39282.patch: fix length checks in parallel
       driver in channels/parallel/client/parallel_main.c.
     - CVE-2022-39282
   * SECURITY UPDATE: out of bounds read via video channel
     - debian/patches/CVE-2022-39283.patch: fixed missing length check in
       video channel in channels/video/client/video_main.c.
     - CVE-2022-39283
   * SECURITY UPDATE: out of bounds reads in ZGFX decoder component
     - debian/patches/CVE-2022-39316_7.patch: added missing length checks in
       zgfx_decompress_segment in libfreerdp/codec/zgfx.c.
     - CVE-2022-39316
     - CVE-2022-39317
   * SECURITY UPDATE: missing input validation in urbdrc
     - debian/patches/CVE-2022-39318.patch: fixed division by zero in urbdrc
       in channels/urbdrc/client/libusb/libusb_udevice.c.
     - CVE-2022-39318
   * SECURITY UPDATE: missing input length validation in urbdrc
     - debian/patches/CVE-2022-39319-1.patch: fixed missing input buffer
       length check in urbdrc in channels/urbdrc/client/data_transfer.c.
     - debian/patches/CVE-2022-39319-2.patch: added missing length check in
       urb_control_transfer in channels/urbdrc/client/data_transfer.c.
     - CVE-2022-39319
   * SECURITY UPDATE: out of bounds read in usb
     - debian/patches/CVE-2022-39320.patch: ensure urb_create_iocompletion
       uses size_t for calculation in
       channels/urbdrc/client/data_transfer.c.
     - CVE-2022-39320
   * SECURITY UPDATE: missing path canonicalization and base path check
     for drive channel
     - debian/patches/CVE-2022-39347-1.patch: added function _wcsncmp in
       winpr/include/winpr/string.h, winpr/libwinpr/crt/string.c.
     - debian/patches/CVE-2022-39347-2.patch: fix wcs*cmp and wcs*len checks
       in winpr/libwinpr/crt/string.c.
     - debian/patches/CVE-2022-39347-3.patch: added wcsstr implementation in
       winpr/include/winpr/string.h, winpr/libwinpr/crt/string.c.
     - debian/patches/CVE-2022-39347-4.patch: fixed path validation in drive
       channel in channels/drive/client/drive_file.c,
       channels/drive/client/drive_file.h,
       channels/drive/client/drive_main.c.
     - CVE-2022-39347 
 -- Marc Deslauriers <email address hidden>  Mon, 21 Nov 2022 08:52:19 -0500 
         | 
    
    
        
        
            
            
                
                | CVE-2022-39282 | 
                FreeRDP is a free remote desktop protocol library and clients. FreeRDP based clients on unix systems using `/parallel` command line switch might read | 
                 
                
                | CVE-2022-39283 | 
                FreeRDP is a free remote desktop protocol library and clients. All FreeRDP based clients when using the `/video` command line switch might read unini | 
                 
                
                | CVE-2022-39316 | 
                FreeRDP is a free remote desktop protocol library and clients. In affected versions there is an out of bound read in ZGFX decoder component of FreeRD | 
                 
                
                | CVE-2022-39317 | 
                FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing a range check for input offset index in ZGFX  | 
                 
                
                | CVE-2022-39318 | 
                FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input validation in `urbdrc` channel. A malic | 
                 
                
                | CVE-2022-39319 | 
                FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in the `urbdrc` chann | 
                 
                
                | CVE-2022-39320 | 
                FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP may attempt integer addition on too narrow types leads to | 
                 
                
                | CVE-2022-39347 | 
                FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing path canonicalization and base path check for | 
                 
             
         | 
        
    
    
        
        
        
            About
              -  
            Send Feedback to @ubuntu_updates