MGASA-2020-0338

Source
https://advisories.mageia.org/MGASA-2020-0338.html
Import Source
https://advisories.mageia.org/MGASA-2020-0338.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2020-0338
Related
Published
2020-08-18T20:43:16Z
Modified
2020-08-18T20:01:59Z
Summary
Updated freerdp packages fix security vulnerability
Details

Integer overflow due to missing input sanitation in rdpegfx channel. The input rectangles from the server are not checked against local surface coordinates and blindly accepted. A malicious server can send data that will crash the client later on (invalid length arguments to a memcpy) (CVE-2020-15103).

The freerdp package has been updated to version 2.2.0, fixing this issue and other bugs.

References
Credits

Affected packages

Mageia:7 / freerdp

Package

Name
freerdp
Purl
pkg:rpm/mageia/freerdp?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.0-1.mga7

Ecosystem specific

{
    "section": "core"
}