First published: Mon Jun 22 2020(Updated: )
In FreeRDP before version 2.1.2, there is an out-of-bound read in glyph_cache_put. This affects all FreeRDP clients with `+glyph-cache` option enabled This is fixed in version 2.1.2.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
FreeRDP FreeRDP | <2.1.2 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
openSUSE Leap | =15.1 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =20.04 | |
Debian Debian Linux | =10.0 | |
debian/freerdp2 | 2.3.0+dfsg1-2+deb11u1 2.10.0+dfsg1-1 2.11.7+dfsg1-4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-11098 is a vulnerability in FreeRDP that allows for an out-of-bound read in the glyph_cache_put function.
CVE-2020-11098 has a severity level of medium with a score of 6.5.
All FreeRDP clients before version 2.1.2 with the +glyph-cache option enabled are affected.
CVE-2020-11098 can be fixed by updating FreeRDP to version 2.1.2 or newer.
You can find more information about CVE-2020-11098 at the following references: [CVE-2020-11098](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11098), [GitHub Advisory](https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-jr57-f58x-hjmv), [FreeRDP Release Announcement](http://www.freerdp.com/2020/06/22/2_1_2-released).