<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE1-SA-2023-0042</id>
    <title>An update for freerdp is now available for HCE 1.1</title>
    <severity>Moderate</severity>
    <release>HCE 1.1</release>
    <issued date="2023-01-05 02:56:01"/>
    <updated date="2023-01-05 02:56:01"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2020-15103" id="CVE-2020-15103" title="CVE-2020-15103 Base Score: 3.5 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2020-4030" id="CVE-2020-4030" title="CVE-2020-4030 Base Score: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2020-11096" id="CVE-2020-11096" title="CVE-2020-11096 Base Score: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2020-4033" id="CVE-2020-4033" title="CVE-2020-4033 Base Score: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2020-11098" id="CVE-2020-11098" title="CVE-2020-11098 Base Score: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" type="cve"/>
    </references>
    <description>Security Fix(es):

In FreeRDP less than or equal to 2.1.2, an integer overflow exists due to missing input sanitation in rdpegfx channel. All FreeRDP clients are affected. The input rectangles from the server are not checked against local surface coordinates and blindly accepted. A malicious server can send data that will crash the client later on (invalid length arguments to a `memcpy`) This has been fixed in 2.2.0. As a workaround, stop using command line arguments /gfx, /gfx-h264 and /network:auto (CVE-2020-15103)

In FreeRDP before version 2.1.2, there is an out of bounds read in TrioParse. Logging might bypass string length checks due to an integer overflow. This is fixed in version 2.1.2. (CVE-2020-4030)

In FreeRDP before version 2.1.2, there is a global OOB read in update_read_cache_bitmap_v3_order. As a workaround, one can disable bitmap cache with -bitmap-cache (default). This is fixed in version 2.1.2. (CVE-2020-11096)

In FreeRDP before version 2.1.2, there is an out of bounds read in RLEDECOMPRESS. All FreeRDP based clients with sessions with color depth &lt; 32 are affected. This is fixed in version 2.1.2. (CVE-2020-4033)

In FreeRDP before version 2.1.2, there is an out-of-bound read in glyph_cache_put. This affects all FreeRDP clients with `+glyph-cache` option enabled This is fixed in version 2.1.2. (CVE-2020-11098)
</description>
    <pkglist>
      <collection short="HCE 1.1" package="freerdp">
        <name>HCE 1.1</name>
        <package arch="x86_64" name="libwinpr" version="2.1.1" release="6.hce1c">
          <filename>libwinpr-2.1.1-6.hce1c.x86_64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
