freerdp is vulnerable to out-of-bound reads. The vulnerability exists due to missing input length validation in the urbdrc
channel which allows an attacker to read out of bound data and send it back to the server.
github.com/FreeRDP/FreeRDP/commit/11555828d2cf289b350baba5ad1f462f10b80b76
github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mvxm-wfj2-5fvh
lists.debian.org/debian-lts-announce/2023/11/msg00010.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGQN3OWQNHSMWKOF4D35PF5ASKNLC74B/
lists.fedoraproject.org/archives/list/[email protected]/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/
lists.fedoraproject.org/archives/list/[email protected]/message/YGQN3OWQNHSMWKOF4D35PF5ASKNLC74B/
secdb.alpinelinux.org/edge/community.yaml
secdb.alpinelinux.org/v3.17/community.yaml