Security update for freerdp
Announcement ID: | SUSE-SU-2019:0539-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves eight vulnerabilities and has four security fixes can now be installed.
Description:
This update for freerdp to version 2.0.0~rc4 fixes the following issues:
Security issues fixed:
- CVE-2018-0886: Fix a remote code execution vulnerability (CredSSP) (bsc#1085416, bsc#1087240, bsc#1104918)
- CVE-2018-8789: Fix several denial of service vulnerabilities in the in the NTLM Authentication module (bsc#1117965)
- CVE-2018-8785: Fix a potential remote code execution vulnerability in the zgfx_decompress function (bsc#1117967)
- CVE-2018-8786: Fix a potential remote code execution vulnerability in the update_read_bitmap_update function (bsc#1117966)
- CVE-2018-8787: Fix a potential remote code execution vulnerability in the gdi_Bitmap_Decompress function (bsc#1117964)
- CVE-2018-8788: Fix a potential remote code execution vulnerability in the nsc_rle_decode function (bsc#1117963)
- CVE-2018-8784: Fix a potential remote code execution vulnerability in the zgfx_decompress_segment function (bsc#1116708)
- CVE-2018-1000852: Fixed a remote memory access in the drdynvc_process_capability_request function (bsc#1120507)
Other issues:
- Upgraded to version 2.0.0-rc4 (FATE#326739)
- Security and stability improvements, including bsc#1103557 and bsc#1112028
- gateway: multiple fixes and improvements
- client/X11: support for rail (remote app) icons was added
- The licensing code was re-worked: Per-device licenses are now saved on the
client and used on re-connect:
WARNING: this is a change in FreeRDP behavior regarding licensing. If the old behavior is required, or no licenses should be saved use the new command line option +old-license (gh#/FreeRDP/FreeRDP#4979) - Improved order handling - only orders that were enable during capability exchange are accepted. WARNING and NOTE: some servers do improperly send orders that weren't negotiated, for such cases the new command line option /relax-order-checks was added to disable the strict order checking. If connecting to xrdp the options /relax-order-checks and +glyph-cache are required. (gh#/FreeRDP/FreeRDP#4926)
- Fixed automount issues
- Fixed several audio and microphone related issues
- Fixed X11 Right-Ctrl ungrab feature
- Fixed race condition in rdpsnd channel server.
- Disabled SSE2 for ARM and powerpc
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Workstation Extension 15
zypper in -t patch SUSE-SLE-Product-WE-15-2019-539=1
Package List:
-
SUSE Linux Enterprise Workstation Extension 15 (x86_64)
- freerdp-debuginfo-2.0.0~rc4-3.3.1
- libfreerdp2-debuginfo-2.0.0~rc4-3.3.1
- freerdp-devel-2.0.0~rc4-3.3.1
- libwinpr2-debuginfo-2.0.0~rc4-3.3.1
- freerdp-debugsource-2.0.0~rc4-3.3.1
- winpr2-devel-2.0.0~rc4-3.3.1
- libwinpr2-2.0.0~rc4-3.3.1
- freerdp-2.0.0~rc4-3.3.1
- libfreerdp2-2.0.0~rc4-3.3.1
References:
- https://www.suse.com/security/cve/CVE-2018-0886.html
- https://www.suse.com/security/cve/CVE-2018-1000852.html
- https://www.suse.com/security/cve/CVE-2018-8784.html
- https://www.suse.com/security/cve/CVE-2018-8785.html
- https://www.suse.com/security/cve/CVE-2018-8786.html
- https://www.suse.com/security/cve/CVE-2018-8787.html
- https://www.suse.com/security/cve/CVE-2018-8788.html
- https://www.suse.com/security/cve/CVE-2018-8789.html
- https://bugzilla.suse.com/show_bug.cgi?id=1085416
- https://bugzilla.suse.com/show_bug.cgi?id=1087240
- https://bugzilla.suse.com/show_bug.cgi?id=1103557
- https://bugzilla.suse.com/show_bug.cgi?id=1104918
- https://bugzilla.suse.com/show_bug.cgi?id=1112028
- https://bugzilla.suse.com/show_bug.cgi?id=1116708
- https://bugzilla.suse.com/show_bug.cgi?id=1117963
- https://bugzilla.suse.com/show_bug.cgi?id=1117964
- https://bugzilla.suse.com/show_bug.cgi?id=1117965
- https://bugzilla.suse.com/show_bug.cgi?id=1117966
- https://bugzilla.suse.com/show_bug.cgi?id=1117967
- https://bugzilla.suse.com/show_bug.cgi?id=1120507