1 |
type: security |
2 |
subject: Updated freerdp packages fix security vulnerability |
3 |
CVE: |
4 |
- CVE-2021-41159 |
5 |
- CVE-2021-41160 |
6 |
src: |
7 |
8: |
8 |
core: |
9 |
- freerdp-2.2.0-1.1.mga8 |
10 |
description: | |
11 |
All FreeRDP clients prior to version 2.4.1 using gateway connections |
12 |
('/gt:rpc') fail to validate input data. A malicious gateway might allow |
13 |
client memory to be written out of bounds. This issue has been resolved in |
14 |
version 2.4.1. If you are unable to update then use `/gt:http` rather than |
15 |
/gt:rdp connections if possible or use a direct connection without a |
16 |
gateway. (CVE-2021-41159) |
17 |
|
18 |
In affected versions a malicious server might trigger out of bound writes |
19 |
in a connected client. Connections using GDI or SurfaceCommands to send |
20 |
graphics updates to the client might send `0` width/height or out of bound |
21 |
rectangles to trigger out of bound writes. With `0` width or heigth the |
22 |
memory allocation will be `0` but the missing bounds checks allow writing |
23 |
to the pointer at this (not allocated) region. This issue has been patched |
24 |
in FreeRDP 2.4.1. (CVE-2021-41160) |
25 |
references: |
26 |
- https://bugs.mageia.org/show_bug.cgi?id=29654 |
27 |
- https://access.redhat.com/errata/RHSA-2021:4622 |
28 |
ID: MGASA-2021-0522 |