{"affected":[{"ecosystem_specific":{"binaries":[{"freerdp":"2.1.2-lp151.5.6.1","freerdp-devel":"2.1.2-lp151.5.6.1","freerdp-proxy":"2.1.2-lp151.5.6.1","freerdp-server":"2.1.2-lp151.5.6.1","freerdp-wayland":"2.1.2-lp151.5.6.1","libfreerdp2":"2.1.2-lp151.5.6.1","libuwac0-0":"2.1.2-lp151.5.6.1","libwinpr2":"2.1.2-lp151.5.6.1","uwac0-0-devel":"2.1.2-lp151.5.6.1","winpr2-devel":"2.1.2-lp151.5.6.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.1","name":"freerdp","purl":"pkg:rpm/opensuse/freerdp&distro=openSUSE%20Leap%2015.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.1.2-lp151.5.6.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for freerdp fixes the following issues:\n\nfrerdp was updated to version 2.1.2 (bsc#1171441,bsc#1173247 and jsc#ECO-2006):\n\n- CVE-2020-11017: Fixed a double free which could have denied the server's service.\n- CVE-2020-11018: Fixed an out of bounds read which a malicious clients could have triggered.\n- CVE-2020-11019: Fixed an issue which could have led to denial of service if logger was set to 'WLOG_TRACE'.\n- CVE-2020-11038: Fixed a buffer overflow when /video redirection was used.\n- CVE-2020-11039: Fixed an issue which could have allowed arbitrary memory read and write when USB redirection was enabled.\n- CVE-2020-11040: Fixed an out of bounds data read in clear_decompress_subcode_rlex.\n- CVE-2020-11041: Fixed an issue with the configuration for sound backend which could have led to server's denial of service.\n- CVE-2020-11043: Fixed an out of bounds read in rfx_process_message_tileset.\n- CVE-2020-11085: Fixed an out of bounds read in cliprdr_read_format_list.\n- CVE-2020-11086: Fixed an out of bounds read in ntlm_read_ntlm_v2_client_challenge.\n- CVE-2020-11087: Fixed an out of bounds read in ntlm_read_AuthenticateMessage.\n- CVE-2020-11088: Fixed an out of bounds read in ntlm_read_NegotiateMessage.\n- CVE-2020-11089: Fixed an out of bounds read in irp function family.\n- CVE-2020-11095: Fixed a global out of bounds read in update_recv_primary_order.\n- CVE-2020-11096: Fixed a global out of bounds read in update_read_cache_bitmap_v3_order.\n- CVE-2020-11097: Fixed an out of bounds read in ntlm_av_pair_get.\n- CVE-2020-11098: Fixed an out of bounds read in glyph_cache_put.\n- CVE-2020-11099: Fixed an out of bounds Read in license_read_new_or_upgrade_license_packet.\n- CVE-2020-11521: Fixed an out of bounds write in planar.c (bsc#1171443).\n- CVE-2020-11522: Fixed an out of bounds read in gdi.c (bsc#1171444).\n- CVE-2020-11523: Fixed an integer overflow in region.c (bsc#1171445).\n- CVE-2020-11524: Fixed an out of bounds write in interleaved.c (bsc#1171446).\n- CVE-2020-11525: Fixed an out of bounds read in bitmap.c (bsc#1171447).\n- CVE-2020-11526: Fixed an out of bounds read in update_recv_secondary_order (bsc#1171674).\n- CVE-2020-13396: Fixed an Read in ntlm_read_ChallengeMessage.\n- CVE-2020-13397: Fixed an out of bounds read in security_fips_decrypt due to uninitialized value.\n- CVE-2020-13398: Fixed an out of bounds write in crypto_rsa_common.\n- CVE-2020-4030: Fixed an out of bounds read in `TrioParse`.\n- CVE-2020-4031: Fixed a use after free in gdi_SelectObject.\n- CVE-2020-4032: Fixed an integer casting in `update_recv_secondary_order`.\n- CVE-2020-4033: Fixed an out of bound read in RLEDECOMPRESS.\n- Fixed an issue where freerdp failed with -fno-common (bsc#1169748).\n- Fixed an issue where USB redirection with FreeRDP was not working (bsc#1169679).\n\nThis update was imported from the SUSE:SLE-15-SP1:Update update project.","id":"openSUSE-SU-2020:1090-1","modified":"2020-07-26T18:19:38Z","published":"2020-07-26T18:19:38Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PMFBUGT3IBZIELBHFAWBVPCGUFYQHVRD/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1169679"},{"type":"REPORT","url":"https://bugzilla.suse.com/1169748"},{"type":"REPORT","url":"https://bugzilla.suse.com/1171441"},{"type":"REPORT","url":"https://bugzilla.suse.com/1171443"},{"type":"REPORT","url":"https://bugzilla.suse.com/1171444"},{"type":"REPORT","url":"https://bugzilla.suse.com/1171445"},{"type":"REPORT","url":"https://bugzilla.suse.com/1171446"},{"type":"REPORT","url":"https://bugzilla.suse.com/1171447"},{"type":"REPORT","url":"https://bugzilla.suse.com/1171474"},{"type":"REPORT","url":"https://bugzilla.suse.com/1173247"},{"type":"REPORT","url":"https://bugzilla.suse.com/1173605"},{"type":"REPORT","url":"https://bugzilla.suse.com/1174200"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-11017"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-11018"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-11019"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-11038"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-11039"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-11040"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-11041"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-11043"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-11085"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-11086"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-11087"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-11088"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-11089"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-11095"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-11096"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-11097"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-11098"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-11099"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-11521"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-11522"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-11523"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-11524"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-11525"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-11526"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-13396"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-13397"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-13398"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-4030"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-4031"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-4032"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-4033"}],"related":["CVE-2020-11017","CVE-2020-11018","CVE-2020-11019","CVE-2020-11038","CVE-2020-11039","CVE-2020-11040","CVE-2020-11041","CVE-2020-11043","CVE-2020-11085","CVE-2020-11086","CVE-2020-11087","CVE-2020-11088","CVE-2020-11089","CVE-2020-11095","CVE-2020-11096","CVE-2020-11097","CVE-2020-11098","CVE-2020-11099","CVE-2020-11521","CVE-2020-11522","CVE-2020-11523","CVE-2020-11524","CVE-2020-11525","CVE-2020-11526","CVE-2020-13396","CVE-2020-13397","CVE-2020-13398","CVE-2020-4030","CVE-2020-4031","CVE-2020-4032","CVE-2020-4033"],"summary":"Security update for freerdp","upstream":["CVE-2020-11017","CVE-2020-11018","CVE-2020-11019","CVE-2020-11038","CVE-2020-11039","CVE-2020-11040","CVE-2020-11041","CVE-2020-11043","CVE-2020-11085","CVE-2020-11086","CVE-2020-11087","CVE-2020-11088","CVE-2020-11089","CVE-2020-11095","CVE-2020-11096","CVE-2020-11097","CVE-2020-11098","CVE-2020-11099","CVE-2020-11521","CVE-2020-11522","CVE-2020-11523","CVE-2020-11524","CVE-2020-11525","CVE-2020-11526","CVE-2020-13396","CVE-2020-13397","CVE-2020-13398","CVE-2020-4030","CVE-2020-4031","CVE-2020-4032","CVE-2020-4033"]}