FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients using a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to integer overflow and out-of-bounds write. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, do not use `/gfx` options (e.g. deactivate with `/bpp:32` or `/rfx` as it is on by default). https://github.com/FreeRDP/FreeRDP/pull/10077 https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6 https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0
Created freerdp tracking bugs for this issue: Affects: fedora-38 [bug 2276742] Affects: fedora-39 [bug 2276743] Affects: fedora-40 [bug 2276739] Created freerdp1.2 tracking bugs for this issue: Affects: epel-7 [bug 2276741] Created freerdp2 tracking bugs for this issue: Affects: fedora-40 [bug 2276744]
Does this vulnerability affect a RHEL 7.9 system that only has freerdp-libs-2.1.1-5.el7_9.x86_64?
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:9092 https://access.redhat.com/errata/RHSA-2024:9092