Buildroot Archive on lore.kernel.org
 help / color / mirror / Atom feed
From: Yann E. MORIN <yann.morin.1998@free.fr>
To: buildroot@busybox.net
Subject: [Buildroot] [PATCH 1/1] package/freerdp: security bump to version 2.1.2
Date: Mon, 13 Jul 2020 18:34:30 +0200	[thread overview]
Message-ID: <20200713163430.GC18825@scaer> (raw)
In-Reply-To: <20200713131125.895748-1-fontaine.fabrice@gmail.com>

Fabrice, All,

On 2020-07-13 15:11 +0200, Fabrice Fontaine spake thusly:
> - Fix CVE-2020-4030: In FreeRDP before version 2.1.2, there is an out of
>   bounds read in TrioParse. Logging might bypass string length checks
>   due to an integer overflow.
> - Fix CVE-2020-4031: In FreeRDP before version 2.1.2, there is a
>   use-after-free in gdi_SelectObject. All FreeRDP clients using
>   compatibility mode with /relax-order-checks are affected.
> - Fix CVE-2020-4032: In FreeRDP before version 2.1.2, there is an
>   integer casting vulnerability in update_recv_secondary_order. All
>   clients with +glyph-cache /relax-order-checks are affected.
> - Fix CVE-2020-4033: In FreeRDP before version 2.1.2, there is an out of
>   bounds read in RLEDECOMPRESS. All FreeRDP based clients with sessions
>   with color depth < 32 are affected.
> - Fix CVE-2020-11095: In FreeRDP before version 2.1.2, an out of bound
>   reads occurs resulting in accessing a memory location that is outside
>   of the boundaries of the static array
>   PRIMARY_DRAWING_ORDER_FIELD_BYTES.
> - Fix CVE-2020-11096: In FreeRDP before version 2.1.2, there is a global
>   OOB read in update_read_cache_bitmap_v3_order. As a workaround, one
>   can disable bitmap cache with -bitmap-cache (default).
> - Fix CVE-2020-11097: In FreeRDP before version 2.1.2, an out of bounds
>   read occurs resulting in accessing a memory location that is outside
>   of the boundaries of the static array
>   PRIMARY_DRAWING_ORDER_FIELD_BYTES.
> - Fix CVE-2020-11098: In FreeRDP before version 2.1.2, there is an
>   out-of-bound read in glyph_cache_put. This affects all FreeRDP clients
>   with `+glyph-cache` option enabled.
> - Fix CVE-2020-11099: In FreeRDP before version 2.1.2, there is an out
>   of bounds read in license_read_new_or_upgrade_license_packet. A
>   manipulated license packet can lead to out of bound reads to an
>   internal buffer.
> 
> Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>

Applied to master, thanks,

Regards,
Yann E. MORIN.

> ---
>  package/freerdp/freerdp.hash | 4 ++--
>  package/freerdp/freerdp.mk   | 2 +-
>  2 files changed, 3 insertions(+), 3 deletions(-)
> 
> diff --git a/package/freerdp/freerdp.hash b/package/freerdp/freerdp.hash
> index a6100271fd..6c52d38a4f 100644
> --- a/package/freerdp/freerdp.hash
> +++ b/package/freerdp/freerdp.hash
> @@ -1,5 +1,5 @@
> -# From https://pub.freerdp.com/releases/freerdp-2.1.1.tar.gz.sha256
> -sha256  6c6bf72fba1058ca6524c040d0825e4cdaa88682884a6c1c360e1cd5b8e21723  freerdp-2.1.1.tar.gz
> +# From https://pub.freerdp.com/releases/freerdp-2.1.2.tar.gz.sha256
> +sha256  f33bc6aef83b8ad3cbf2cdbc82dcfa980ec2b051efb72650f6f2365d55b79b8d  freerdp-2.1.2.tar.gz
>  
>  # Locally calculated
>  sha256  cfc7749b96f63bd31c3c42b5c471bf756814053e847c10f3eb003417bc523d30  LICENSE
> diff --git a/package/freerdp/freerdp.mk b/package/freerdp/freerdp.mk
> index f3bc26ac52..33b83922cc 100644
> --- a/package/freerdp/freerdp.mk
> +++ b/package/freerdp/freerdp.mk
> @@ -4,7 +4,7 @@
>  #
>  ################################################################################
>  
> -FREERDP_VERSION = 2.1.1
> +FREERDP_VERSION = 2.1.2
>  FREERDP_SITE = https://pub.freerdp.com/releases
>  FREERDP_DEPENDENCIES = libglib2 openssl zlib
>  FREERDP_LICENSE = Apache-2.0
> -- 
> 2.27.0
> 

-- 
.-----------------.--------------------.------------------.--------------------.
|  Yann E. MORIN  | Real-Time Embedded | /"\ ASCII RIBBON | Erics' conspiracy: |
| +33 662 376 056 | Software  Designer | \ / CAMPAIGN     |  ___               |
| +33 561 099 427 `------------.-------:  X  AGAINST      |  \e/  There is no  |
| http://ymorin.is-a-geek.org/ | _/*\_ | / \ HTML MAIL    |   v   conspiracy.  |
'------------------------------^-------^------------------^--------------------'

  reply	other threads:[~2020-07-13 16:34 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-07-13 13:11 [Buildroot] [PATCH 1/1] package/freerdp: security bump to version 2.1.2 Fabrice Fontaine
2020-07-13 16:34 ` Yann E. MORIN [this message]
2020-07-22 12:27 ` Peter Korsgaard

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20200713163430.GC18825@scaer \
    --to=yann.morin.1998@free.fr \
    --cc=buildroot@busybox.net \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox