openSUSE Security Update: Security update for freerdp
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2019:0325-1
Rating:             important
References:         #1085416 #1087240 #1103557 #1104918 #1112028 
                    #1116708 #1117963 #1117964 #1117965 #1117966 
                    #1117967 #1120507 
Cross-References:   CVE-2018-0886 CVE-2018-1000852 CVE-2018-8784
                    CVE-2018-8785 CVE-2018-8786 CVE-2018-8787
                    CVE-2018-8788 CVE-2018-8789
Affected Products:
                    openSUSE Leap 15.0
______________________________________________________________________________

   An update that solves 8 vulnerabilities and has four fixes
   is now available.

Description:

   This update for freerdp to version 2.0.0~rc4 fixes the following issues:

   Security issues fixed:

   - CVE-2018-0886: Fix a remote code execution vulnerability (CredSSP)
     (bsc#1085416, bsc#1087240, bsc#1104918)
   - CVE-2018-8789: Fix several denial of service vulnerabilities in the in
     the NTLM Authentication module (bsc#1117965)
   - CVE-2018-8785: Fix a potential remote code execution vulnerability in
     the zgfx_decompress function (bsc#1117967)
   - CVE-2018-8786: Fix a potential remote code execution vulnerability in
     the update_read_bitmap_update function (bsc#1117966)
   - CVE-2018-8787: Fix a potential remote code execution vulnerability in
     the gdi_Bitmap_Decompress function (bsc#1117964)
   - CVE-2018-8788: Fix a potential remote code execution vulnerability in
     the nsc_rle_decode function (bsc#1117963)
   - CVE-2018-8784: Fix a potential remote code execution vulnerability in
     the zgfx_decompress_segment function (bsc#1116708)
   - CVE-2018-1000852: Fixed a remote memory access in the
     drdynvc_process_capability_request function (bsc#1120507)

   Other issues:

   - Upgraded to version 2.0.0-rc4 (FATE#326739)
   - Security and stability improvements, including bsc#1103557 and
     bsc#1112028
   - gateway: multiple fixes and improvements
   - client/X11: support for rail (remote app) icons was added
   - The licensing code was re-worked: Per-device licenses are now saved on
     the client and used on re-connect: WARNING: this is a change in FreeRDP
     behavior regarding licensing. If the old behavior is required, or no
     licenses should be saved use the new command line option +old-license
     (gh#/FreeRDP/FreeRDP#4979)
   - Improved order handling -  only orders that were enable  during
     capability exchange are accepted. WARNING and NOTE: some servers do
     improperly send orders that weren't negotiated, for such cases the new
     command line option /relax-order-checks was added to disable the strict
     order checking. If connecting to xrdp the options /relax-order-checks
     *and* +glyph-cache are required. (gh#/FreeRDP/FreeRDP#4926)
   - Fixed automount issues
   - Fixed several audio and microphone related issues
   - Fixed X11 Right-Ctrl ungrab feature
   - Fixed race condition in rdpsnd channel server.
   - Disabled SSE2 for ARM and powerpc

   This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 15.0:

      zypper in -t patch openSUSE-2019-325=1



Package List:

   - openSUSE Leap 15.0 (x86_64):

      freerdp-2.0.0~rc4-lp150.2.3.1
      freerdp-debuginfo-2.0.0~rc4-lp150.2.3.1
      freerdp-debugsource-2.0.0~rc4-lp150.2.3.1
      freerdp-devel-2.0.0~rc4-lp150.2.3.1
      freerdp-server-2.0.0~rc4-lp150.2.3.1
      freerdp-server-debuginfo-2.0.0~rc4-lp150.2.3.1
      freerdp-wayland-2.0.0~rc4-lp150.2.3.1
      freerdp-wayland-debuginfo-2.0.0~rc4-lp150.2.3.1
      libfreerdp2-2.0.0~rc4-lp150.2.3.1
      libfreerdp2-debuginfo-2.0.0~rc4-lp150.2.3.1
      libuwac0-0-2.0.0~rc4-lp150.2.3.1
      libuwac0-0-debuginfo-2.0.0~rc4-lp150.2.3.1
      libwinpr2-2.0.0~rc4-lp150.2.3.1
      libwinpr2-debuginfo-2.0.0~rc4-lp150.2.3.1
      uwac0-0-devel-2.0.0~rc4-lp150.2.3.1
      winpr2-devel-2.0.0~rc4-lp150.2.3.1


References:

   https://www.suse.com/security/cve/CVE-2018-0886.html
   https://www.suse.com/security/cve/CVE-2018-1000852.html
   https://www.suse.com/security/cve/CVE-2018-8784.html
   https://www.suse.com/security/cve/CVE-2018-8785.html
   https://www.suse.com/security/cve/CVE-2018-8786.html
   https://www.suse.com/security/cve/CVE-2018-8787.html
   https://www.suse.com/security/cve/CVE-2018-8788.html
   https://www.suse.com/security/cve/CVE-2018-8789.html
   https://bugzilla.suse.com/1085416
   https://bugzilla.suse.com/1087240
   https://bugzilla.suse.com/1103557
   https://bugzilla.suse.com/1104918
   https://bugzilla.suse.com/1112028
   https://bugzilla.suse.com/1116708
   https://bugzilla.suse.com/1117963
   https://bugzilla.suse.com/1117964
   https://bugzilla.suse.com/1117965
   https://bugzilla.suse.com/1117966
   https://bugzilla.suse.com/1117967
   https://bugzilla.suse.com/1120507

-- 

openSUSE: 2019:0325-1: important: freerdp

March 14, 2019
An update that solves 8 vulnerabilities and has four fixes is now available.

Description

This update for freerdp to version 2.0.0~rc4 fixes the following issues: Security issues fixed: - CVE-2018-0886: Fix a remote code execution vulnerability (CredSSP) (bsc#1085416, bsc#1087240, bsc#1104918) - CVE-2018-8789: Fix several denial of service vulnerabilities in the in the NTLM Authentication module (bsc#1117965) - CVE-2018-8785: Fix a potential remote code execution vulnerability in the zgfx_decompress function (bsc#1117967) - CVE-2018-8786: Fix a potential remote code execution vulnerability in the update_read_bitmap_update function (bsc#1117966) - CVE-2018-8787: Fix a potential remote code execution vulnerability in the gdi_Bitmap_Decompress function (bsc#1117964) - CVE-2018-8788: Fix a potential remote code execution vulnerability in the nsc_rle_decode function (bsc#1117963) - CVE-2018-8784: Fix a potential remote code execution vulnerability in the zgfx_decompress_segment function (bsc#1116708) - CVE-2018-1000852: Fixed a remote memory access in the drdynvc_process_capability_request function (bsc#1120507) Other issues: - Upgraded to version 2.0.0-rc4 (FATE#326739) - Security and stability improvements, including bsc#1103557 and bsc#1112028 - gateway: multiple fixes and improvements - client/X11: support for rail (remote app) icons was added - The licensing code was re-worked: Per-device licenses are now saved on the client and used on re-connect: WARNING: this is a change in FreeRDP behavior regarding licensing. If the old behavior is required, or no licenses should be saved use the new command line option +old-license (gh#/FreeRDP/FreeRDP#4979) - Improved order handling - only orders that were enable during capability exchange are accepted. WARNING and NOTE: some servers do improperly send orders that weren't negotiated, for such cases the new command line option /relax-order-checks was added to disable the strict order checking. If connecting to xrdp the options /relax-order-checks *and* +glyph-cache are required. (gh#/FreeRDP/FreeRDP#4926) - Fixed automount issues - Fixed several audio and microphone related issues - Fixed X11 Right-Ctrl ungrab feature - Fixed race condition in rdpsnd channel server. - Disabled SSE2 for ARM and powerpc This update was imported from the SUSE:SLE-15:Update update project.

 

Patch

Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.0: zypper in -t patch openSUSE-2019-325=1


Package List

- openSUSE Leap 15.0 (x86_64): freerdp-2.0.0~rc4-lp150.2.3.1 freerdp-debuginfo-2.0.0~rc4-lp150.2.3.1 freerdp-debugsource-2.0.0~rc4-lp150.2.3.1 freerdp-devel-2.0.0~rc4-lp150.2.3.1 freerdp-server-2.0.0~rc4-lp150.2.3.1 freerdp-server-debuginfo-2.0.0~rc4-lp150.2.3.1 freerdp-wayland-2.0.0~rc4-lp150.2.3.1 freerdp-wayland-debuginfo-2.0.0~rc4-lp150.2.3.1 libfreerdp2-2.0.0~rc4-lp150.2.3.1 libfreerdp2-debuginfo-2.0.0~rc4-lp150.2.3.1 libuwac0-0-2.0.0~rc4-lp150.2.3.1 libuwac0-0-debuginfo-2.0.0~rc4-lp150.2.3.1 libwinpr2-2.0.0~rc4-lp150.2.3.1 libwinpr2-debuginfo-2.0.0~rc4-lp150.2.3.1 uwac0-0-devel-2.0.0~rc4-lp150.2.3.1 winpr2-devel-2.0.0~rc4-lp150.2.3.1


References

https://www.suse.com/security/cve/CVE-2018-0886.html https://www.suse.com/security/cve/CVE-2018-1000852.html https://www.suse.com/security/cve/CVE-2018-8784.html https://www.suse.com/security/cve/CVE-2018-8785.html https://www.suse.com/security/cve/CVE-2018-8786.html https://www.suse.com/security/cve/CVE-2018-8787.html https://www.suse.com/security/cve/CVE-2018-8788.html https://www.suse.com/security/cve/CVE-2018-8789.html https://bugzilla.suse.com/1085416 https://bugzilla.suse.com/1087240 https://bugzilla.suse.com/1103557 https://bugzilla.suse.com/1104918 https://bugzilla.suse.com/1112028 https://bugzilla.suse.com/1116708 https://bugzilla.suse.com/1117963 https://bugzilla.suse.com/1117964 https://bugzilla.suse.com/1117965 https://bugzilla.suse.com/1117966 https://bugzilla.suse.com/1117967 https://bugzilla.suse.com/1120507--


Severity
Announcement ID: openSUSE-SU-2019:0325-1
Rating: important
Affected Products: openSUSE Leap 15.0 le.

Related News