{"schema_version": "1.3.1", "id": "RLSA-2020:4647", "modified": "2023-02-02T13:08:28.394085Z", "published": "2020-11-03T12:23:37Z", "related": ["CVE-2020-11018", "CVE-2020-11019", "CVE-2020-11038", "CVE-2020-11039", "CVE-2020-11040", "CVE-2020-11041", "CVE-2020-11042", "CVE-2020-11043", "CVE-2020-11044", "CVE-2020-11045", "CVE-2020-11046", "CVE-2020-11047", "CVE-2020-11048", "CVE-2020-11049", "CVE-2020-11058", "CVE-2020-11085", "CVE-2020-11086", "CVE-2020-11087", "CVE-2020-11088", "CVE-2020-11089", "CVE-2020-11522", "CVE-2020-11525", "CVE-2020-11526", "CVE-2020-13396", "CVE-2020-13397"], "summary": "Moderate: freerdp and vinagre security, bug fix, and enhancement update", "details": "FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.\n\nThe vinagre packages provide the Vinagre remote desktop viewer for the GNOME desktop.\n\nThe following packages have been upgraded to a later upstream version: freerdp (2.1.1). (BZ#1834287)\n\nSecurity Fix(es):\n\n* freerdp: Out of bound read in cliprdr_server_receive_capabilities (CVE-2020-11018)\n\n* freerdp: Out of bound read/write in usb redirection channel (CVE-2020-11039)\n\n* freerdp: out-of-bounds read in update_read_icon_info function (CVE-2020-11042)\n\n* freerdp: out-of-bounds read in autodetect_recv_bandwidth_measure_results function (CVE-2020-11047)\n\n* freerdp: Out-of-bounds read in ntlm_read_ChallengeMessage in winpr/libwinpr/sspi/NTLM/ntlm_message.c. (CVE-2020-13396)\n\n* freerdp: Out-of-bounds read in security_fips_decrypt in libfreerdp/core/security.c (CVE-2020-13397)\n\n* freerdp: Out of bound read in update_recv could result in a crash (CVE-2020-11019)\n\n* freerdp: Integer overflow in VIDEO channel (CVE-2020-11038)\n\n* freerdp: Out of bound access in clear_decompress_subcode_rlex (CVE-2020-11040)\n\n* freerdp: Unchecked read of array offset in rdpsnd_recv_wave2_pdu (CVE-2020-11041)\n\n* freerdp: out of bound read in rfx_process_message_tileset (CVE-2020-11043)\n\n* freerdp: double free in update_read_cache_bitmap_v3_order function (CVE-2020-11044)\n\n* freerdp: out of bounds read in update_read_bitmap_data function (CVE-2020-11045)\n\n* freerdp: out of bounds seek in update_read_synchronize function could lead out of bounds read (CVE-2020-11046)\n\n* freerdp: out-of-bounds read could result in aborting the session (CVE-2020-11048)\n\n* freerdp: out-of-bound read of client memory that is then passed on to the protocol parser (CVE-2020-11049)\n\n* freerdp: stream out-of-bounds seek in rdp_read_font_capability_set could lead to out-of-bounds read (CVE-2020-11058)\n\n* freerdp: out-of-bounds read in cliprdr_read_format_list function (CVE-2020-11085)\n\n* freerdp: out-of-bounds read in ntlm_read_ntlm_v2_client_challenge function (CVE-2020-11086)\n\n* freerdp: out-of-bounds read in ntlm_read_AuthenticateMessage (CVE-2020-11087)\n\n* freerdp: out-of-bounds read in ntlm_read_NegotiateMessage (CVE-2020-11088)\n\n* freerdp: out-of-bounds read in irp functions (CVE-2020-11089)\n\n* freerdp: out-of-bounds read in gdi.c (CVE-2020-11522)\n\n* freerdp: out-of-bounds read in bitmap.c (CVE-2020-11525)\n\n* freerdp: Stream pointer out of bounds in update_recv_secondary_order could lead out of bounds read later (CVE-2020-11526)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.", "severity": [{"type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L"}], "affected": [{"package": {"ecosystem": "Rocky Linux:8", "name": "vinagre", "purl": "pkg:rpm/rocky-linux/vinagre?distro=rocky-linux-8&epoch=0"}, "ranges": [{"type": "ECOSYSTEM", "events": [{"introduced": "0"}, {"fixed": "0:3.22.0-23.el8"}], "database_specific": {"yum_repository": "AppStream"}}]}], "references": [{"type": "ADVISORY", "url": "https://errata.rockylinux.org/RLSA-2020:4647"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761144"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1803054"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1834287"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1835382"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1835391"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1835399"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1835403"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1835762"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1835766"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1835772"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1835779"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1836223"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1836239"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1836247"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1839744"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1841189"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1841196"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844161"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844166"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844171"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844177"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844184"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848008"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848012"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848018"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848022"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848029"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848034"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848038"}], "credits": [{"name": "Rocky Enterprise Software Foundation"}, {"name": "Red Hat"}]}