In FreeRDP before version 2.1.2, an out of bounds read occurs resulting in accessing a memory location that is outside of the boundaries of the static array PRIMARY_DRAWING_ORDER_FIELD_BYTES. This is fixed in version 2.1.2. References: http://www.freerdp.com/2020/06/22/2_1_2-released https://github.com/FreeRDP/FreeRDP/commit/58a3122250d54de3a944c487776bcd4d1da4721e https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c8x2-c3c9-9r3f
Created freerdp tracking bugs for this issue: Affects: epel-all [bug 1854915] Affects: fedora-all [bug 1854913]
This flaw affects freerdp clients and servers. In winpr/libwinpr/sspi/NTLM/ntlm_av_pairs.c, there is a static array AV_PAIR_STRINGS[] which could be indexed out-of-bounds by routines in the file. The patch uses a getter and sanitization routine to prevent this and modifies the calling functions appropriately.
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:1849 https://access.redhat.com/errata/RHSA-2021:1849
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-11097