Debian 10364 Published by

Debian GNU/Linux 11 (Bullseye) LTS has been updated with security updates for freerdp2, trafficserver, and tryton-client:

[DLA 4053-1] freerdp2 security update
[DLA 4055-1] trafficserver security update
[DLA 4054-1] tryton-client security update




[SECURITY] [DLA 4053-1] freerdp2 security update


-------------------------------------------------------------------------
Debian LTS Advisory DLA-4053-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Tobias Frost
February 15, 2025 https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package : freerdp2
Version : 2.3.0+dfsg1-2+deb11u2
CVE ID : CVE-2021-41160 CVE-2022-24883 CVE-2022-39282 CVE-2022-39283
CVE-2022-39316 CVE-2022-39318 CVE-2022-39319 CVE-2022-39347
CVE-2022-41877 CVE-2023-39350 CVE-2023-39351 CVE-2023-39352
CVE-2023-39353 CVE-2023-39354 CVE-2023-39356 CVE-2023-40181
CVE-2023-40186 CVE-2023-40188 CVE-2023-40567 CVE-2023-40569
CVE-2023-40589 CVE-2024-22211 CVE-2024-32039 CVE-2024-32040
CVE-2024-32458 CVE-2024-32459 CVE-2024-32460 CVE-2024-32658
CVE-2024-32659 CVE-2024-32660 CVE-2024-32661
Debian Bug : 1001062 1021659 1051638 1061173 1069728 1072112

Multiple vulnerabilties have been found in freelrdp2, a free
implementation of the Remote Desktop Protocol (RDP). The vulnerabilties
potentially allows authentication bypasses on configuration errors,
buffer overreads, DoS vectors, buffer overflows or accessing files
outside of a shared directory.

CVE-2021-41160

In affected versions a malicious server might trigger out of bound
writes in a connected client. Connections using GDI or SurfaceCommands
to send graphics updates to the client might send `0` width/height or
out of bound rectangles to trigger out of bound writes. With `0` width
or heigth the memory allocation will be `0` but the missing bounds
checks allow writing to the pointer at this (not allocated) region.

CVE-2022-24883

Prior to version 2.7.0, server side authentication against a `SAM` file
might be successful for invalid credentials if the server has configured
an invalid `SAM` file path. FreeRDP based clients are not affected. RDP
server implementations using FreeRDP to authenticate against a `SAM`
file are affected. Version 2.7.0 contains a fix for this issue. As a
workaround, use custom authentication via `HashCallback` and/or ensure
the `SAM` database path configured is valid and the application has file
handles left.

CVE-2022-39282

FreeRDP based clients on unix systems using `/parallel` command line
switch might read uninitialized data and send it to the server the
client is currently connected to. FreeRDP based server implementations
are not affected.

CVE-2023-39283

All FreeRDP based clients when using the `/video` command line switch
might read uninitialized data, decode it as audio/video and display the
result. FreeRDP based server implementations are not affected.

CVE-2022-39316

In affected versions there is an out of bound read in ZGFX decoder
component of FreeRDP. A malicious server can trick a FreeRDP based
client to read out of bound data and try to decode it likely resulting
in a crash.

CVE-2022-39318

Affected versions of FreeRDP are missing input validation in `urbdrc`
channel. A malicious server can trick a FreeRDP based client to crash
with division by zero.

CVE-2022-39319

Affected versions of FreeRDP are missing input length validation in the
`urbdrc` channel. A malicious server can trick a FreeRDP based client to
read out of bound data and send it back to the server.

CVE-2022-39347

Affected versions of FreeRDP are missing path canonicalization and base
path check for `drive` channel. A malicious server can trick a FreeRDP
based client to read files outside the shared directory.

CVE-2022-41877

Affected versions of FreeRDP are missing input length validation in
`drive` channel. A malicious server can trick a FreeRDP based client to
read out of bound data and send it back to the server.

CVE-2023-39350

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP),
released under the Apache license. This issue affects Clients only.
Integer underflow leading to DOS (e.g. abort due to `WINPR_ASSERT` with
default compilation flags). When an insufficient blockLen is provided,
and proper length validation is not performed, an Integer Underflow
occurs, leading to a Denial of Service (DOS) vulnerability. This issue
has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised
to upgrade. There are no known workarounds for this vulnerability.

CVE-2023-39351

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP),
released under the Apache license. Affected versions of FreeRDP are
subject to a Null Pointer Dereference leading a crash in the RemoteFX
(rfx) handling. Inside the `rfx_process_message_tileset` function, the
program allocates tiles using `rfx_allocate_tiles` for the number of
numTiles. If the initialization process of tiles is not completed for
various reasons, tiles will have a NULL pointer. Which may be accessed
in further processing and would cause a program crash. This issue has
been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to
upgrade. There are no known workarounds for this vulnerability.

CVE-2023-39352

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP),
released under the Apache license. Affected versions are subject to an
invalid offset validation leading to Out Of Bound Write. This can be
triggered when the values `rect->left` and `rect->top` are exactly equal
to `surface->width` and `surface->height`. eg. `rect->left` ==
`surface->width` && `rect->top` == `surface->height`. In practice this
should cause a crash. This issue has been addressed in versions 2.11.0
and 3.0.0-beta3. Users are advised to upgrade. There are no known
workarounds for this vulnerability.

CVE-2023-39353

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP),
released under the Apache license. Affected versions are subject to a
missing offset validation leading to Out Of Bound Read. In the
`libfreerdp/codec/rfx.c` file there is no offset validation in
`tile->quantIdxY`, `tile->quantIdxCb`, and `tile->quantIdxCr`. As a
result crafted input can lead to an out of bounds read access which in
turn will cause a crash. This issue has been addressed in versions
2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known
workarounds for this vulnerability.

CVE-2023-39354

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP),
released under the Apache license. Affected versions are subject to an
Out-Of-Bounds Read in the `nsc_rle_decompress_data` function. The
Out-Of-Bounds Read occurs because it processes `context->Planes` without
checking if it contains data of sufficient length. Should an attacker be
able to leverage this vulnerability they may be able to cause a crash.
This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users
are advised to upgrade. There are no known workarounds for this
vulnerability.

CVE-2023-39355

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP),
released under the Apache license. Versions of FreeRDP on the 3.x
release branch before beta3 are subject to a Use-After-Free in
processing `RDPGFX_CMDID_RESETGRAPHICS` packets. If
`context->maxPlaneSize` is 0, `context->planesBuffer` will be freed.
However, without updating `context->planesBuffer`, this leads to a
Use-After-Free exploit vector. In most environments this should only
result in a crash. This issue has been addressed in version 3.0.0-beta3
and users of the beta 3.x releases are advised to upgrade. There are no
known workarounds for this vulnerability.

CVE-2023-39356

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP),
released under the Apache license. In affected versions a missing offset
validation may lead to an Out Of Bound Read in the function
`gdi_multi_opaque_rect`. In particular there is no code to validate if
the value `multi_opaque_rect->numRectangles` is less than 45. Looping
through `multi_opaque_rect->`numRectangles without proper boundary
checks can lead to Out-of-Bounds Read errors which will likely lead to a
crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3.
Users are advised to upgrade. There are no known workarounds for this
vulnerability.

CVE-2023-40181

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP),
released under the Apache license. Affected versions are subject to an
Integer-Underflow leading to Out-Of-Bound Read in the
`zgfx_decompress_segment` function. In the context of `CopyMemory`, it's
possible to read data beyond the transmitted packet range and likely
cause a crash. This issue has been addressed in versions 2.11.0 and
3.0.0-beta3. Users are advised to upgrade. There are no known
workarounds for this issue.

CVE-2023-40186

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP),
released under the Apache license. Affected versions are subject to an
IntegerOverflow leading to Out-Of-Bound Write Vulnerability in the
`gdi_CreateSurface` function. This issue affects FreeRDP based clients
only. FreeRDP proxies are not affected as image decoding is not done by
a proxy. This issue has been addressed in versions 2.11.0 and
3.0.0-beta3. Users are advised to upgrade. There are no known
workarounds for this issue.

CVE-2023-40188

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP),
released under the Apache license. Affected versions are subject to an
Out-Of-Bounds Read in the `general_LumaToYUV444` function. This
Out-Of-Bounds Read occurs because processing is done on the `in`
variable without checking if it contains data of sufficient length.
Insufficient data for the `in` variable may cause errors or crashes.
This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users
are advised to upgrade. There are no known workarounds for this issue.

CVE-2023-40567

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP),
released under the Apache license. Affected versions are subject to an
Out-Of-Bounds Write in the `clear_decompress_bands_data` function in
which there is no offset validation. Abuse of this vulnerability may
lead to an out of bounds write. This issue has been addressed in
versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. there are
no known workarounds for this vulnerability.

CVE-2023-40569

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP),
released under the Apache license. Affected versions are subject to an
Out-Of-Bounds Write in the `progressive_decompress` function. This issue
is likely down to incorrect calculations of the `nXSrc` and `nYSrc`
variables. This issue has been addressed in versions 2.11.0 and
3.0.0-beta3. Users are advised to upgrade. there are no known
workarounds for this vulnerability.

CVE-2023-40589

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP),
released under the Apache license. In affected versions there is a
Global-Buffer-Overflow in the ncrush_decompress function. Feeding
crafted input into this function can trigger the overflow which has only
been shown to cause a crash. This issue has been addressed in versions
2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known
workarounds for this issue.

CVE-2024-22211

FreeRDP is a set of free and open source remote desktop protocol library
and clients. In affected versions an integer overflow in
`freerdp_bitmap_planar_context_reset` leads to heap-buffer overflow.
This affects FreeRDP based clients. FreeRDP based server implementations
and proxy are not affected. A malicious server could prepare a
`RDPGFX_RESET_GRAPHICS_PDU` to allocate too small buffers, possibly
triggering later out of bound read/write. Data extraction over network
is not possible, the buffers are used to display an image. This issue
has been addressed in version 2.11.5 and 3.2.0. Users are advised to
upgrade. there are no know workarounds for this vulnerability.

CVE-2024-32039

FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP
based clients using a version of FreeRDP prior to 3.5.0 or 2.11.6 are
vulnerable to integer overflow and out-of-bounds write. Versions 3.5.0
and 2.11.6 patch the issue. As a workaround, do not use `/gfx` options
(e.g. deactivate with `/bpp:32` or `/rfx` as it is on by default).

CVE-2024-32040

FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP
based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 and
have connections to servers using the `NSC` codec are vulnerable to
integer underflow. Versions 3.5.0 and 2.11.6 patch the issue. As a
workaround, do not use the NSC codec (e.g. use `-nsc`).

CVE-2024-32458

FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP
based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are
vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the
issue. As a workaround, use `/gfx` or `/rfx` modes (on by default,
require server side support).

CVE-2024-32459

FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP
based clients and servers that use a version of FreeRDP prior to 3.5.0
or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and
2.11.6 patch the issue. No known workarounds are available.

CVE-2024-32460

FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP
based based clients using `/bpp:32` legacy `GDI` drawing path with a
version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to
out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a
workaround, use modern drawing paths (e.g. `/rfx` or `/gfx` options).
The workaround requires server side support.

CVE-2024-32658

FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP
based clients prior to version 3.5.1 are vulnerable to out-of-bounds
read. Version 3.5.1 contains a patch for the issue. No known workarounds
are available.

CVE-2024-32659

FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP
based clients prior to version 3.5.1 are vulnerable to out-of-bounds
read if `((nWidth == 0) and (nHeight == 0))`. Version 3.5.1 contains a
patch for the issue. No known workarounds are available.

CVE-2024-32660

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior
to version 3.5.1, a malicious server can crash the FreeRDP client by
sending invalid huge allocation size. Version 3.5.1 contains a patch for
the issue. No known workarounds are available.

CVE-2024-32661

FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP
based clients prior to version 3.5.1 are vulnerable to a possible `NULL`
access and crash. Version 3.5.1 contains a patch for the issue. No known
workarounds are available.

For Debian 11 bullseye, these problems have been fixed in version
2.3.0+dfsg1-2+deb11u2.

We recommend that you upgrade your freerdp2 packages.

For the detailed security status of freerdp2 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/freerdp2

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



[SECURITY] [DLA 4055-1] trafficserver security update


-------------------------------------------------------------------------
Debian LTS Advisory DLA-4055-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Daniel Leidert
February 16, 2025 https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package : trafficserver
Version : 8.1.11+ds-0+deb11u2
CVE ID : CVE-2024-38479 CVE-2024-50306
Debian Bug : 1087531

Multiple vulnerabilities were fixed in trafficserver, a caching proxy
server.

CVE-2024-38479

An improper input validation vulnerability allows potential cache
poisoning.

CVE-2024-50306

An unchecked return value can allow Apache Traffic Server to retain
privileges on startup.

For Debian 11 bullseye, these problems have been fixed in version
8.1.11+ds-0+deb11u2.

We recommend that you upgrade your trafficserver packages.

For the detailed security status of trafficserver please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/trafficserver

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



[SECURITY] [DLA 4054-1] tryton-client security update


-------------------------------------------------------------------------
Debian LTS Advisory DLA-4054-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Daniel Leidert
February 16, 2025 https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package : tryton-client
Version : 5.0.33-1+deb11u1
CVE ID : not yet available
Debian Bug : none

Cédric Krier has found that trytond, the Tryton application server,
accepts compressed content from unauthenticated requests which makes it
vulnerable to zip bomb attacks (see DLA 4022-1).

This update fixes a potential regression in tryton-client. It allows
users only to send gzip content within a session.

For Debian 11 bullseye, this problem has been fixed in version
5.0.33-1+deb11u1.

We recommend that you upgrade your tryton-client packages.

For the detailed security status of tryton-client please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/tryton-client

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS