/[advisories]/29654.adv
ViewVC logotype

Contents of /29654.adv

Parent Directory Parent Directory | Revision Log Revision Log


Revision 12748 - (show annotations) (download)
Thu Nov 25 11:22:19 2021 UTC (2 years, 4 months ago) by tmb
File size: 1204 byte(s)
MGASA-2021-0522: freerdp-2.2.0-1.1.mga8
1 type: security
2 subject: Updated freerdp packages fix security vulnerability
3 CVE:
4 - CVE-2021-41159
5 - CVE-2021-41160
6 src:
7 8:
8 core:
9 - freerdp-2.2.0-1.1.mga8
10 description: |
11 All FreeRDP clients prior to version 2.4.1 using gateway connections
12 ('/gt:rpc') fail to validate input data. A malicious gateway might allow
13 client memory to be written out of bounds. This issue has been resolved in
14 version 2.4.1. If you are unable to update then use `/gt:http` rather than
15 /gt:rdp connections if possible or use a direct connection without a
16 gateway. (CVE-2021-41159)
17
18 In affected versions a malicious server might trigger out of bound writes
19 in a connected client. Connections using GDI or SurfaceCommands to send
20 graphics updates to the client might send `0` width/height or out of bound
21 rectangles to trigger out of bound writes. With `0` width or heigth the
22 memory allocation will be `0` but the missing bounds checks allow writing
23 to the pointer at this (not allocated) region. This issue has been patched
24 in FreeRDP 2.4.1. (CVE-2021-41160)
25 references:
26 - https://bugs.mageia.org/show_bug.cgi?id=29654
27 - https://access.redhat.com/errata/RHSA-2021:4622
28 ID: MGASA-2021-0522

  ViewVC Help
Powered by ViewVC 1.1.30