SUSE-SU-2020:2272-1: important: Security update for freerdp

sle-updates at lists.suse.com sle-updates at lists.suse.com
Tue Aug 18 13:14:43 MDT 2020


   SUSE Security Update: Security update for freerdp
______________________________________________________________________________

Announcement ID:    SUSE-SU-2020:2272-1
Rating:             important
References:         #1004108 #1050699 #1050704 #1050708 #1050711 
                    #1050712 #1050714 #1085416 #1087240 #1090677 
                    #1103557 #1104918 #1112028 #1116708 #1117963 
                    #1117964 #1117965 #1117966 #1117967 #1120507 
                    #1129193 #1169679 #1169748 #1171441 #1171443 
                    #1171444 #1171445 #1171446 #1171447 #1171674 
                    #1173247 #1173605 #1174200 #1174321 
Cross-References:   CVE-2017-2834 CVE-2017-2835 CVE-2017-2836
                    CVE-2017-2837 CVE-2017-2838 CVE-2017-2839
                    CVE-2018-0886 CVE-2018-1000852 CVE-2018-8784
                    CVE-2018-8785 CVE-2018-8786 CVE-2018-8787
                    CVE-2018-8788 CVE-2018-8789 CVE-2020-11017
                    CVE-2020-11018 CVE-2020-11019 CVE-2020-11038
                    CVE-2020-11039 CVE-2020-11040 CVE-2020-11041
                    CVE-2020-11043 CVE-2020-11085 CVE-2020-11086
                    CVE-2020-11087 CVE-2020-11088 CVE-2020-11089
                    CVE-2020-11095 CVE-2020-11096 CVE-2020-11097
                    CVE-2020-11098 CVE-2020-11099 CVE-2020-11521
                    CVE-2020-11522 CVE-2020-11523 CVE-2020-11524
                    CVE-2020-11525 CVE-2020-11526 CVE-2020-13396
                    CVE-2020-13397 CVE-2020-13398 CVE-2020-15103
                    CVE-2020-4030 CVE-2020-4031 CVE-2020-4032
                    CVE-2020-4033
Affected Products:
                    SUSE Linux Enterprise Workstation Extension 12-SP5
                    SUSE Linux Enterprise Software Development Kit 12-SP5
______________________________________________________________________________

   An update that fixes 46 vulnerabilities is now available.

Description:

   This update for freerdp fixes the following issues:

   freerdp was updated to version 2.1.2 (bsc#1171441,bsc#1173247 and
   jsc#ECO-2006):

   - CVE-2020-11017: Fixed a double free which could have denied the server's
     service.
   - CVE-2020-11018: Fixed an out of bounds read which a malicious clients
     could have triggered.
   - CVE-2020-11019: Fixed an issue which could have led to denial of service
     if logger was set to "WLOG_TRACE".
   - CVE-2020-11038: Fixed a buffer overflow when /video redirection was used.
   - CVE-2020-11039: Fixed an issue which could have allowed arbitrary memory
     read and write when USB redirection was enabled.
   - CVE-2020-11040: Fixed an out of bounds data read in
     clear_decompress_subcode_rlex.
   - CVE-2020-11041: Fixed an issue with the configuration for sound backend
     which could have led to server's denial of service.
   - CVE-2020-11043: Fixed an out of bounds read in
     rfx_process_message_tileset.
   - CVE-2020-11085: Fixed an out of bounds read in cliprdr_read_format_list.
   - CVE-2020-11086: Fixed an out of bounds read in
     ntlm_read_ntlm_v2_client_challenge.
   - CVE-2020-11087: Fixed an out of bounds read in
     ntlm_read_AuthenticateMessage.
   - CVE-2020-11088: Fixed an out of bounds read in
     ntlm_read_NegotiateMessage.
   - CVE-2020-11089: Fixed an out of bounds read in irp function family.
   - CVE-2020-11095: Fixed a global out of bounds read in
     update_recv_primary_order.
   - CVE-2020-11096: Fixed a global out of bounds read in
     update_read_cache_bitmap_v3_order.
   - CVE-2020-11097: Fixed an out of bounds read in ntlm_av_pair_get.
   - CVE-2020-11098: Fixed an out of bounds read in glyph_cache_put.
   - CVE-2020-11099: Fixed an out of bounds Read in
     license_read_new_or_upgrade_license_packet.
   - CVE-2020-11521: Fixed an out of bounds write in planar.c (bsc#1171443).
   - CVE-2020-11522: Fixed an out of bounds read in gdi.c (bsc#1171444).
   - CVE-2020-11523: Fixed an integer overflow in region.c (bsc#1171445).
   - CVE-2020-11524: Fixed an out of bounds write in interleaved.c
     (bsc#1171446).
   - CVE-2020-11525: Fixed an out of bounds read in bitmap.c (bsc#1171447).
   - CVE-2020-11526: Fixed an out of bounds read in
     update_recv_secondary_order (bsc#1171674).
   - CVE-2020-13396: Fixed an Read in ntlm_read_ChallengeMessage.
   - CVE-2020-13397: Fixed an out of bounds read in security_fips_decrypt due
     to uninitialized value.
   - CVE-2020-13398: Fixed an out of bounds write in crypto_rsa_common.
   - CVE-2020-4030: Fixed an out of bounds read in `TrioParse`.
   - CVE-2020-4031: Fixed a use after free in gdi_SelectObject.
   - CVE-2020-4032: Fixed an integer casting in `update_recv_secondary_order`.
   - CVE-2020-4033: Fixed an out of bound read in RLEDECOMPRESS.
   - Fixed an issue where freerdp failed with -fno-common (bsc#1169748).
   - Fixed an issue where USB redirection with FreeRDP was not working
     (bsc#1169679).
   - Fixed an issue where freerdp could not start (bsc#1129193).
   - Fixed an issue where copy and paste between remote host was transforming
     text to chinese (bsc#1004108).
   - Added pulse support (bsc#1090677).

   Additionally, the following issue was fixed:

   - CVE-2020-15103: Fix integer overflow due to missing input sanitation in
     rdpegfx channel (bsc#1174321).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Workstation Extension 12-SP5:

      zypper in -t patch SUSE-SLE-WE-12-SP5-2020-2272=1

   - SUSE Linux Enterprise Software Development Kit 12-SP5:

      zypper in -t patch SUSE-SLE-SDK-12-SP5-2020-2272=1



Package List:

   - SUSE Linux Enterprise Workstation Extension 12-SP5 (noarch):

      vinagre-lang-3.20.2-16.3.3

   - SUSE Linux Enterprise Workstation Extension 12-SP5 (x86_64):

      freerdp-2.1.2-12.20.1
      freerdp-debuginfo-2.1.2-12.20.1
      freerdp-debugsource-2.1.2-12.20.1
      freerdp-proxy-2.1.2-12.20.1
      freerdp-server-2.1.2-12.20.1
      libfreerdp2-2.1.2-12.20.1
      libfreerdp2-debuginfo-2.1.2-12.20.1
      libwinpr2-2.1.2-12.20.1
      libwinpr2-debuginfo-2.1.2-12.20.1
      vinagre-3.20.2-16.3.3
      vinagre-debuginfo-3.20.2-16.3.3
      vinagre-debugsource-3.20.2-16.3.3

   - SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le s390x x86_64):

      freerdp-debuginfo-2.1.2-12.20.1
      freerdp-debugsource-2.1.2-12.20.1
      freerdp-devel-2.1.2-12.20.1
      libfreerdp2-2.1.2-12.20.1
      libfreerdp2-debuginfo-2.1.2-12.20.1
      libwinpr2-2.1.2-12.20.1
      libwinpr2-debuginfo-2.1.2-12.20.1
      winpr2-devel-2.1.2-12.20.1


References:

   https://www.suse.com/security/cve/CVE-2017-2834.html
   https://www.suse.com/security/cve/CVE-2017-2835.html
   https://www.suse.com/security/cve/CVE-2017-2836.html
   https://www.suse.com/security/cve/CVE-2017-2837.html
   https://www.suse.com/security/cve/CVE-2017-2838.html
   https://www.suse.com/security/cve/CVE-2017-2839.html
   https://www.suse.com/security/cve/CVE-2018-0886.html
   https://www.suse.com/security/cve/CVE-2018-1000852.html
   https://www.suse.com/security/cve/CVE-2018-8784.html
   https://www.suse.com/security/cve/CVE-2018-8785.html
   https://www.suse.com/security/cve/CVE-2018-8786.html
   https://www.suse.com/security/cve/CVE-2018-8787.html
   https://www.suse.com/security/cve/CVE-2018-8788.html
   https://www.suse.com/security/cve/CVE-2018-8789.html
   https://www.suse.com/security/cve/CVE-2020-11017.html
   https://www.suse.com/security/cve/CVE-2020-11018.html
   https://www.suse.com/security/cve/CVE-2020-11019.html
   https://www.suse.com/security/cve/CVE-2020-11038.html
   https://www.suse.com/security/cve/CVE-2020-11039.html
   https://www.suse.com/security/cve/CVE-2020-11040.html
   https://www.suse.com/security/cve/CVE-2020-11041.html
   https://www.suse.com/security/cve/CVE-2020-11043.html
   https://www.suse.com/security/cve/CVE-2020-11085.html
   https://www.suse.com/security/cve/CVE-2020-11086.html
   https://www.suse.com/security/cve/CVE-2020-11087.html
   https://www.suse.com/security/cve/CVE-2020-11088.html
   https://www.suse.com/security/cve/CVE-2020-11089.html
   https://www.suse.com/security/cve/CVE-2020-11095.html
   https://www.suse.com/security/cve/CVE-2020-11096.html
   https://www.suse.com/security/cve/CVE-2020-11097.html
   https://www.suse.com/security/cve/CVE-2020-11098.html
   https://www.suse.com/security/cve/CVE-2020-11099.html
   https://www.suse.com/security/cve/CVE-2020-11521.html
   https://www.suse.com/security/cve/CVE-2020-11522.html
   https://www.suse.com/security/cve/CVE-2020-11523.html
   https://www.suse.com/security/cve/CVE-2020-11524.html
   https://www.suse.com/security/cve/CVE-2020-11525.html
   https://www.suse.com/security/cve/CVE-2020-11526.html
   https://www.suse.com/security/cve/CVE-2020-13396.html
   https://www.suse.com/security/cve/CVE-2020-13397.html
   https://www.suse.com/security/cve/CVE-2020-13398.html
   https://www.suse.com/security/cve/CVE-2020-15103.html
   https://www.suse.com/security/cve/CVE-2020-4030.html
   https://www.suse.com/security/cve/CVE-2020-4031.html
   https://www.suse.com/security/cve/CVE-2020-4032.html
   https://www.suse.com/security/cve/CVE-2020-4033.html
   https://bugzilla.suse.com/1004108
   https://bugzilla.suse.com/1050699
   https://bugzilla.suse.com/1050704
   https://bugzilla.suse.com/1050708
   https://bugzilla.suse.com/1050711
   https://bugzilla.suse.com/1050712
   https://bugzilla.suse.com/1050714
   https://bugzilla.suse.com/1085416
   https://bugzilla.suse.com/1087240
   https://bugzilla.suse.com/1090677
   https://bugzilla.suse.com/1103557
   https://bugzilla.suse.com/1104918
   https://bugzilla.suse.com/1112028
   https://bugzilla.suse.com/1116708
   https://bugzilla.suse.com/1117963
   https://bugzilla.suse.com/1117964
   https://bugzilla.suse.com/1117965
   https://bugzilla.suse.com/1117966
   https://bugzilla.suse.com/1117967
   https://bugzilla.suse.com/1120507
   https://bugzilla.suse.com/1129193
   https://bugzilla.suse.com/1169679
   https://bugzilla.suse.com/1169748
   https://bugzilla.suse.com/1171441
   https://bugzilla.suse.com/1171443
   https://bugzilla.suse.com/1171444
   https://bugzilla.suse.com/1171445
   https://bugzilla.suse.com/1171446
   https://bugzilla.suse.com/1171447
   https://bugzilla.suse.com/1171674
   https://bugzilla.suse.com/1173247
   https://bugzilla.suse.com/1173605
   https://bugzilla.suse.com/1174200
   https://bugzilla.suse.com/1174321



More information about the sle-updates mailing list