Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2018-1000852
Vulnerability from cvelistv5
Published
2018-12-20 15:00
Modified
2024-08-05 12:47
Severity ?
EPSS score ?
Summary
FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via RDPClient must connect the rdp server with echo option. This vulnerability appears to have been fixed in after commit 205c612820dac644d665b5bb1cdf437dc5ca01e3.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T12:47:57.451Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/FreeRDP/FreeRDP/pull/4871/commits/baee520e3dd9be6511c45a14c5f5e77784de1471", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/FreeRDP/FreeRDP/issues/4866", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/FreeRDP/FreeRDP/pull/4871", }, { name: "FEDORA-2019-b2d986c3e9", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YVJKO2DR5EY4C4QZOP7SNNBEW2JW6FHX/", }, { name: "RHSA-2019:2157", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2019:2157", }, { name: "USN-4379-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4379-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], dateAssigned: "2018-11-27T00:00:00", datePublic: "2018-12-20T00:00:00", descriptions: [ { lang: "en", value: "FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via RDPClient must connect the rdp server with echo option. This vulnerability appears to have been fixed in after commit 205c612820dac644d665b5bb1cdf437dc5ca01e3.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-06-04T22:06:07", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/FreeRDP/FreeRDP/pull/4871/commits/baee520e3dd9be6511c45a14c5f5e77784de1471", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/FreeRDP/FreeRDP/issues/4866", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/FreeRDP/FreeRDP/pull/4871", }, { name: "FEDORA-2019-b2d986c3e9", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YVJKO2DR5EY4C4QZOP7SNNBEW2JW6FHX/", }, { name: "RHSA-2019:2157", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2019:2157", }, { name: "USN-4379-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4379-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", DATE_ASSIGNED: "2018-11-27T14:14:31.672614", DATE_REQUESTED: "2018-11-09T01:21:55", ID: "CVE-2018-1000852", REQUESTER: "tonix0114@gmail.com", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via RDPClient must connect the rdp server with echo option. This vulnerability appears to have been fixed in after commit 205c612820dac644d665b5bb1cdf437dc5ca01e3.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/FreeRDP/FreeRDP/pull/4871/commits/baee520e3dd9be6511c45a14c5f5e77784de1471", refsource: "MISC", url: "https://github.com/FreeRDP/FreeRDP/pull/4871/commits/baee520e3dd9be6511c45a14c5f5e77784de1471", }, { name: "https://github.com/FreeRDP/FreeRDP/issues/4866", refsource: "MISC", url: "https://github.com/FreeRDP/FreeRDP/issues/4866", }, { name: "https://github.com/FreeRDP/FreeRDP/pull/4871", refsource: "MISC", url: "https://github.com/FreeRDP/FreeRDP/pull/4871", }, { name: "FEDORA-2019-b2d986c3e9", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YVJKO2DR5EY4C4QZOP7SNNBEW2JW6FHX/", }, { name: "RHSA-2019:2157", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:2157", }, { name: "USN-4379-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4379-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-1000852", datePublished: "2018-12-20T15:00:00", dateReserved: "2018-11-09T00:00:00", dateUpdated: "2024-08-05T12:47:57.451Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2018-1000852\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-12-20T15:29:02.597\",\"lastModified\":\"2024-11-21T03:40:29.923\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via RDPClient must connect the rdp server with echo option. This vulnerability appears to have been fixed in after commit 205c612820dac644d665b5bb1cdf437dc5ca01e3.\"},{\"lang\":\"es\",\"value\":\"FreeRDP 2.0.0-rc3, en versiones anteriores al commit con ID 205c612820dac644d665b5bb1cdf437dc5ca01e3, contiene una vulnerabilidad desconocida en channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request que puede resultar en que el servidor RDP sea capaz de leer la memoria del cliente. El cliente debe conectarse al servidor RDP con la opción \\\"echo\\\". La vulnerabilidad parece haber sido solucionada tras el commit con ID 205c612820dac644d665b5bb1cdf437dc5ca01e3.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":2.5}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:P\",\"baseScore\":6.4,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.0.0\",\"matchCriteriaId\":\"F4CC65E0-718B-44E3-A05A-913698689674\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freerdp:freerdp:2.0.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"46A636A2-66DD-4926-8984-ABEC06E1735B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freerdp:freerdp:2.0.0:rc0:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9D8EB00-9004-4493-BC51-E8E1E0F5B83A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freerdp:freerdp:2.0.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F226993C-3AB8-4F86-8591-40CAAC8DD73E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:freerdp:freerdp:2.0.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"985D90BF-3B2B-4A3C-B698-DBCB0241B95B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A31C8344-3E02-4EB8-8BD8-4C84B7959624\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"902B8056-9E37-443B-8905-8AA93E2447FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC1BD7B7-6D88-42B8-878E-F1318CA5FCAF\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2157\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/FreeRDP/FreeRDP/issues/4866\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/FreeRDP/FreeRDP/pull/4871\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/FreeRDP/FreeRDP/pull/4871/commits/baee520e3dd9be6511c45a14c5f5e77784de1471\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YVJKO2DR5EY4C4QZOP7SNNBEW2JW6FHX/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/4379-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2157\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/FreeRDP/FreeRDP/issues/4866\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/FreeRDP/FreeRDP/pull/4871\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/FreeRDP/FreeRDP/pull/4871/commits/baee520e3dd9be6511c45a14c5f5e77784de1471\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YVJKO2DR5EY4C4QZOP7SNNBEW2JW6FHX/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/4379-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", }, }
RHSA-2019:2157
Vulnerability from csaf_redhat
Published
2019-08-06 12:36
Modified
2024-11-22 12:43
Summary
Red Hat Security Advisory: freerdp and vinagre security, bug fix, and enhancement update
Notes
Topic
An update for freerdp and vinagre is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.
The vinagre packages provide the Vinagre remote desktop viewer for the GNOME desktop.
The following packages have been upgraded to a later upstream version: freerdp (2.0.0). (BZ#1291254)
Security Fix(es):
* freerdp: out of bounds read in drdynvc_process_capability_request (CVE-2018-1000852)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.7 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Low", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for freerdp and vinagre is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.\n\nThe vinagre packages provide the Vinagre remote desktop viewer for the GNOME desktop.\n\nThe following packages have been upgraded to a later upstream version: freerdp (2.0.0). (BZ#1291254)\n\nSecurity Fix(es):\n\n* freerdp: out of bounds read in drdynvc_process_capability_request (CVE-2018-1000852)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.7 Release Notes linked from the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:2157", url: "https://access.redhat.com/errata/RHSA-2019:2157", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#low", url: "https://access.redhat.com/security/updates/classification/#low", }, { category: "external", summary: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.7_release_notes/index", url: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.7_release_notes/index", }, { category: "external", summary: "1291254", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1291254", }, { category: "external", summary: "1569552", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1569552", }, { category: "external", summary: "1661640", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1661640", }, { category: "external", summary: "1680229", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1680229", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2157.json", }, ], title: "Red Hat Security Advisory: freerdp and vinagre security, bug fix, and enhancement update", tracking: { current_release_date: "2024-11-22T12:43:21+00:00", generator: { date: "2024-11-22T12:43:21+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2019:2157", initial_release_date: "2019-08-06T12:36:51+00:00", revision_history: [ { date: "2019-08-06T12:36:51+00:00", number: "1", summary: "Initial version", }, { date: "2019-08-06T12:36:51+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T12:43:21+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Client (v. 7)", product: { name: "Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Client Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server (v. 7)", product: { name: "Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation (v. 7)", product: { name: "Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::workstation", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::workstation", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", product: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", product_id: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-debuginfo@2.0.0-1.rc4.el7?arch=x86_64", }, }, }, { category: "product_version", name: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", product: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", product_id: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr-devel@2.0.0-1.rc4.el7?arch=x86_64", }, }, }, { category: "product_version", name: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", product: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", product_id: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-devel@2.0.0-1.rc4.el7?arch=x86_64", }, }, }, { category: "product_version", name: "freerdp-0:2.0.0-1.rc4.el7.x86_64", product: { name: "freerdp-0:2.0.0-1.rc4.el7.x86_64", product_id: "freerdp-0:2.0.0-1.rc4.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp@2.0.0-1.rc4.el7?arch=x86_64", }, }, }, { category: "product_version", name: "libwinpr-0:2.0.0-1.rc4.el7.x86_64", product: { name: "libwinpr-0:2.0.0-1.rc4.el7.x86_64", product_id: "libwinpr-0:2.0.0-1.rc4.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr@2.0.0-1.rc4.el7?arch=x86_64", }, }, }, { category: "product_version", name: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", product: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", product_id: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-libs@2.0.0-1.rc4.el7?arch=x86_64", }, }, }, { category: "product_version", name: "vinagre-0:3.22.0-12.el7.x86_64", product: { name: "vinagre-0:3.22.0-12.el7.x86_64", product_id: "vinagre-0:3.22.0-12.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre@3.22.0-12.el7?arch=x86_64", }, }, }, { category: "product_version", name: "vinagre-debuginfo-0:3.22.0-12.el7.x86_64", product: { name: "vinagre-debuginfo-0:3.22.0-12.el7.x86_64", product_id: "vinagre-debuginfo-0:3.22.0-12.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre-debuginfo@3.22.0-12.el7?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", product: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", product_id: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-debuginfo@2.0.0-1.rc4.el7?arch=i686", }, }, }, { category: "product_version", name: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686", product: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686", product_id: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr-devel@2.0.0-1.rc4.el7?arch=i686", }, }, }, { category: "product_version", name: "freerdp-devel-0:2.0.0-1.rc4.el7.i686", product: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.i686", product_id: "freerdp-devel-0:2.0.0-1.rc4.el7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-devel@2.0.0-1.rc4.el7?arch=i686", }, }, }, { category: "product_version", name: "libwinpr-0:2.0.0-1.rc4.el7.i686", product: { name: "libwinpr-0:2.0.0-1.rc4.el7.i686", product_id: "libwinpr-0:2.0.0-1.rc4.el7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr@2.0.0-1.rc4.el7?arch=i686", }, }, }, { category: "product_version", name: "freerdp-libs-0:2.0.0-1.rc4.el7.i686", product: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.i686", product_id: "freerdp-libs-0:2.0.0-1.rc4.el7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-libs@2.0.0-1.rc4.el7?arch=i686", }, }, }, { category: "product_version", name: "vinagre-0:3.22.0-12.el7.i686", product: { name: "vinagre-0:3.22.0-12.el7.i686", product_id: "vinagre-0:3.22.0-12.el7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre@3.22.0-12.el7?arch=i686", }, }, }, { category: "product_version", name: "vinagre-debuginfo-0:3.22.0-12.el7.i686", product: { name: "vinagre-debuginfo-0:3.22.0-12.el7.i686", product_id: "vinagre-debuginfo-0:3.22.0-12.el7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre-debuginfo@3.22.0-12.el7?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "freerdp-0:2.0.0-1.rc4.el7.src", product: { name: "freerdp-0:2.0.0-1.rc4.el7.src", product_id: "freerdp-0:2.0.0-1.rc4.el7.src", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp@2.0.0-1.rc4.el7?arch=src", }, }, }, { category: "product_version", name: "vinagre-0:3.22.0-12.el7.src", product: { name: "vinagre-0:3.22.0-12.el7.src", product_id: "vinagre-0:3.22.0-12.el7.src", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre@3.22.0-12.el7?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", product: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", product_id: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-debuginfo@2.0.0-1.rc4.el7?arch=ppc", }, }, }, { category: "product_version", name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", product: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", product_id: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr-devel@2.0.0-1.rc4.el7?arch=ppc", }, }, }, { category: "product_version", name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc", product: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc", product_id: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-devel@2.0.0-1.rc4.el7?arch=ppc", }, }, }, { category: "product_version", name: "libwinpr-0:2.0.0-1.rc4.el7.ppc", product: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc", product_id: "libwinpr-0:2.0.0-1.rc4.el7.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr@2.0.0-1.rc4.el7?arch=ppc", }, }, }, { category: "product_version", name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc", product: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc", product_id: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-libs@2.0.0-1.rc4.el7?arch=ppc", }, }, }, { category: "product_version", name: "vinagre-0:3.22.0-12.el7.ppc", product: { name: "vinagre-0:3.22.0-12.el7.ppc", product_id: "vinagre-0:3.22.0-12.el7.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre@3.22.0-12.el7?arch=ppc", }, }, }, { category: "product_version", name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc", product: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc", product_id: "vinagre-debuginfo-0:3.22.0-12.el7.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre-debuginfo@3.22.0-12.el7?arch=ppc", }, }, }, ], category: "architecture", name: "ppc", }, { branches: [ { category: "product_version", name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", product: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", product_id: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-debuginfo@2.0.0-1.rc4.el7?arch=ppc64", }, }, }, { category: "product_version", name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", product: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", product_id: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr-devel@2.0.0-1.rc4.el7?arch=ppc64", }, }, }, { category: "product_version", name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", product: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", product_id: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-devel@2.0.0-1.rc4.el7?arch=ppc64", }, }, }, { category: "product_version", name: "freerdp-0:2.0.0-1.rc4.el7.ppc64", product: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64", product_id: "freerdp-0:2.0.0-1.rc4.el7.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp@2.0.0-1.rc4.el7?arch=ppc64", }, }, }, { category: "product_version", name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64", product: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64", product_id: "libwinpr-0:2.0.0-1.rc4.el7.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr@2.0.0-1.rc4.el7?arch=ppc64", }, }, }, { category: "product_version", name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", product: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", product_id: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-libs@2.0.0-1.rc4.el7?arch=ppc64", }, }, }, { category: "product_version", name: "vinagre-0:3.22.0-12.el7.ppc64", product: { name: "vinagre-0:3.22.0-12.el7.ppc64", product_id: "vinagre-0:3.22.0-12.el7.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre@3.22.0-12.el7?arch=ppc64", }, }, }, { category: "product_version", name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64", product: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64", product_id: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre-debuginfo@3.22.0-12.el7?arch=ppc64", }, }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", product: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", product_id: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-debuginfo@2.0.0-1.rc4.el7?arch=s390", }, }, }, { category: "product_version", name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390", product: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390", product_id: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr-devel@2.0.0-1.rc4.el7?arch=s390", }, }, }, { category: "product_version", name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390", product: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390", product_id: "freerdp-devel-0:2.0.0-1.rc4.el7.s390", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-devel@2.0.0-1.rc4.el7?arch=s390", }, }, }, { category: "product_version", name: "libwinpr-0:2.0.0-1.rc4.el7.s390", product: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390", product_id: "libwinpr-0:2.0.0-1.rc4.el7.s390", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr@2.0.0-1.rc4.el7?arch=s390", }, }, }, { category: "product_version", name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390", product: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390", product_id: "freerdp-libs-0:2.0.0-1.rc4.el7.s390", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-libs@2.0.0-1.rc4.el7?arch=s390", }, }, }, { category: "product_version", name: "vinagre-0:3.22.0-12.el7.s390", product: { name: "vinagre-0:3.22.0-12.el7.s390", product_id: "vinagre-0:3.22.0-12.el7.s390", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre@3.22.0-12.el7?arch=s390", }, }, }, { category: "product_version", name: "vinagre-debuginfo-0:3.22.0-12.el7.s390", product: { name: "vinagre-debuginfo-0:3.22.0-12.el7.s390", product_id: "vinagre-debuginfo-0:3.22.0-12.el7.s390", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre-debuginfo@3.22.0-12.el7?arch=s390", }, }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", product: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", product_id: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-debuginfo@2.0.0-1.rc4.el7?arch=s390x", }, }, }, { category: "product_version", name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", product: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", product_id: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr-devel@2.0.0-1.rc4.el7?arch=s390x", }, }, }, { category: "product_version", name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x", product: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x", product_id: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-devel@2.0.0-1.rc4.el7?arch=s390x", }, }, }, { category: "product_version", name: "freerdp-0:2.0.0-1.rc4.el7.s390x", product: { name: "freerdp-0:2.0.0-1.rc4.el7.s390x", product_id: "freerdp-0:2.0.0-1.rc4.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp@2.0.0-1.rc4.el7?arch=s390x", }, }, }, { category: "product_version", name: "libwinpr-0:2.0.0-1.rc4.el7.s390x", product: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390x", product_id: "libwinpr-0:2.0.0-1.rc4.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr@2.0.0-1.rc4.el7?arch=s390x", }, }, }, { category: "product_version", name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x", product: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x", product_id: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-libs@2.0.0-1.rc4.el7?arch=s390x", }, }, }, { category: "product_version", name: "vinagre-0:3.22.0-12.el7.s390x", product: { name: "vinagre-0:3.22.0-12.el7.s390x", product_id: "vinagre-0:3.22.0-12.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre@3.22.0-12.el7?arch=s390x", }, }, }, { category: "product_version", name: "vinagre-debuginfo-0:3.22.0-12.el7.s390x", product: { name: "vinagre-debuginfo-0:3.22.0-12.el7.s390x", product_id: "vinagre-debuginfo-0:3.22.0-12.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre-debuginfo@3.22.0-12.el7?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", product: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", product_id: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-debuginfo@2.0.0-1.rc4.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", product: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", product_id: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr-devel@2.0.0-1.rc4.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", product: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", product_id: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-devel@2.0.0-1.rc4.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "freerdp-0:2.0.0-1.rc4.el7.ppc64le", product: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64le", product_id: "freerdp-0:2.0.0-1.rc4.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp@2.0.0-1.rc4.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le", product: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le", product_id: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr@2.0.0-1.rc4.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", product: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", product_id: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-libs@2.0.0-1.rc4.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "vinagre-0:3.22.0-12.el7.ppc64le", product: { name: "vinagre-0:3.22.0-12.el7.ppc64le", product_id: "vinagre-0:3.22.0-12.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre@3.22.0-12.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", product: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", product_id: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre-debuginfo@3.22.0-12.el7?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.src", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.src", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-0:3.22.0-12.el7.i686", }, product_reference: "vinagre-0:3.22.0-12.el7.i686", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc", }, product_reference: "vinagre-0:3.22.0-12.el7.ppc", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc64", }, product_reference: "vinagre-0:3.22.0-12.el7.ppc64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc64le", }, product_reference: "vinagre-0:3.22.0-12.el7.ppc64le", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-0:3.22.0-12.el7.s390", }, product_reference: "vinagre-0:3.22.0-12.el7.s390", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-0:3.22.0-12.el7.s390x", }, product_reference: "vinagre-0:3.22.0-12.el7.s390x", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-0:3.22.0-12.el7.src", }, product_reference: "vinagre-0:3.22.0-12.el7.src", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-0:3.22.0-12.el7.x86_64", }, product_reference: "vinagre-0:3.22.0-12.el7.x86_64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.i686", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.ppc", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.s390", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.s390x", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.x86_64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.src", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.src", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.src", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-0:3.22.0-12.el7.i686", }, product_reference: "vinagre-0:3.22.0-12.el7.i686", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc", }, product_reference: "vinagre-0:3.22.0-12.el7.ppc", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc64", }, product_reference: "vinagre-0:3.22.0-12.el7.ppc64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc64le", }, product_reference: "vinagre-0:3.22.0-12.el7.ppc64le", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-0:3.22.0-12.el7.s390", }, product_reference: "vinagre-0:3.22.0-12.el7.s390", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-0:3.22.0-12.el7.s390x", }, product_reference: "vinagre-0:3.22.0-12.el7.s390x", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-0:3.22.0-12.el7.src", }, product_reference: "vinagre-0:3.22.0-12.el7.src", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-0:3.22.0-12.el7.x86_64", }, product_reference: "vinagre-0:3.22.0-12.el7.x86_64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.i686", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.ppc", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.s390", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.s390x", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.x86_64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.src", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.src", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.src", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-0:3.22.0-12.el7.i686", }, product_reference: "vinagre-0:3.22.0-12.el7.i686", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc", }, product_reference: "vinagre-0:3.22.0-12.el7.ppc", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc64", }, product_reference: "vinagre-0:3.22.0-12.el7.ppc64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc64le", }, product_reference: "vinagre-0:3.22.0-12.el7.ppc64le", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-0:3.22.0-12.el7.s390", }, product_reference: "vinagre-0:3.22.0-12.el7.s390", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-0:3.22.0-12.el7.s390x", }, product_reference: "vinagre-0:3.22.0-12.el7.s390x", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-0:3.22.0-12.el7.src", }, product_reference: "vinagre-0:3.22.0-12.el7.src", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-0:3.22.0-12.el7.x86_64", }, product_reference: "vinagre-0:3.22.0-12.el7.x86_64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.i686", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.ppc", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.s390", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.s390x", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.x86_64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.src", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-optional-7.7", }, ], }, vulnerabilities: [ { cve: "CVE-2018-1000852", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2018-12-20T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1661640", }, ], notes: [ { category: "description", text: "FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via RDPClient must connect the rdp server with echo option. This vulnerability appears to have been fixed in after commit 205c612820dac644d665b5bb1cdf437dc5ca01e3.", title: "Vulnerability description", }, { category: "summary", text: "freerdp: out of bounds read in drdynvc_process_capability_request", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:vinagre-0:3.22.0-12.el7.i686", "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc", "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc64", "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc64le", "7Client-7.7:vinagre-0:3.22.0-12.el7.s390", "7Client-7.7:vinagre-0:3.22.0-12.el7.s390x", "7Client-7.7:vinagre-0:3.22.0-12.el7.src", "7Client-7.7:vinagre-0:3.22.0-12.el7.x86_64", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:vinagre-0:3.22.0-12.el7.i686", "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc", "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc64", "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc64le", "7Server-7.7:vinagre-0:3.22.0-12.el7.s390", "7Server-7.7:vinagre-0:3.22.0-12.el7.s390x", "7Server-7.7:vinagre-0:3.22.0-12.el7.src", "7Server-7.7:vinagre-0:3.22.0-12.el7.x86_64", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.i686", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc64", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc64le", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.s390", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.s390x", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.src", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.x86_64", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1000852", }, { category: "external", summary: "RHBZ#1661640", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1661640", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1000852", url: "https://www.cve.org/CVERecord?id=CVE-2018-1000852", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000852", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000852", }, ], release_date: "2018-09-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-08-06T12:36:51+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:vinagre-0:3.22.0-12.el7.i686", "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc", "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc64", "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc64le", "7Client-7.7:vinagre-0:3.22.0-12.el7.s390", "7Client-7.7:vinagre-0:3.22.0-12.el7.s390x", "7Client-7.7:vinagre-0:3.22.0-12.el7.src", "7Client-7.7:vinagre-0:3.22.0-12.el7.x86_64", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:vinagre-0:3.22.0-12.el7.i686", "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc", "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc64", "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc64le", "7Server-7.7:vinagre-0:3.22.0-12.el7.s390", "7Server-7.7:vinagre-0:3.22.0-12.el7.s390x", "7Server-7.7:vinagre-0:3.22.0-12.el7.src", "7Server-7.7:vinagre-0:3.22.0-12.el7.x86_64", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.i686", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc64", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc64le", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.s390", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.s390x", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.src", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.x86_64", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:2157", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:vinagre-0:3.22.0-12.el7.i686", "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc", "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc64", "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc64le", "7Client-7.7:vinagre-0:3.22.0-12.el7.s390", "7Client-7.7:vinagre-0:3.22.0-12.el7.s390x", "7Client-7.7:vinagre-0:3.22.0-12.el7.src", "7Client-7.7:vinagre-0:3.22.0-12.el7.x86_64", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:vinagre-0:3.22.0-12.el7.i686", "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc", "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc64", "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc64le", "7Server-7.7:vinagre-0:3.22.0-12.el7.s390", "7Server-7.7:vinagre-0:3.22.0-12.el7.s390x", "7Server-7.7:vinagre-0:3.22.0-12.el7.src", "7Server-7.7:vinagre-0:3.22.0-12.el7.x86_64", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.i686", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc64", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc64le", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.s390", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.s390x", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.src", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.x86_64", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "freerdp: out of bounds read in drdynvc_process_capability_request", }, ], }
rhsa-2019:2157
Vulnerability from csaf_redhat
Published
2019-08-06 12:36
Modified
2024-11-22 12:43
Summary
Red Hat Security Advisory: freerdp and vinagre security, bug fix, and enhancement update
Notes
Topic
An update for freerdp and vinagre is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.
The vinagre packages provide the Vinagre remote desktop viewer for the GNOME desktop.
The following packages have been upgraded to a later upstream version: freerdp (2.0.0). (BZ#1291254)
Security Fix(es):
* freerdp: out of bounds read in drdynvc_process_capability_request (CVE-2018-1000852)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.7 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Low", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for freerdp and vinagre is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.\n\nThe vinagre packages provide the Vinagre remote desktop viewer for the GNOME desktop.\n\nThe following packages have been upgraded to a later upstream version: freerdp (2.0.0). (BZ#1291254)\n\nSecurity Fix(es):\n\n* freerdp: out of bounds read in drdynvc_process_capability_request (CVE-2018-1000852)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.7 Release Notes linked from the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:2157", url: "https://access.redhat.com/errata/RHSA-2019:2157", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#low", url: "https://access.redhat.com/security/updates/classification/#low", }, { category: "external", summary: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.7_release_notes/index", url: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.7_release_notes/index", }, { category: "external", summary: "1291254", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1291254", }, { category: "external", summary: "1569552", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1569552", }, { category: "external", summary: "1661640", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1661640", }, { category: "external", summary: "1680229", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1680229", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2157.json", }, ], title: "Red Hat Security Advisory: freerdp and vinagre security, bug fix, and enhancement update", tracking: { current_release_date: "2024-11-22T12:43:21+00:00", generator: { date: "2024-11-22T12:43:21+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2019:2157", initial_release_date: "2019-08-06T12:36:51+00:00", revision_history: [ { date: "2019-08-06T12:36:51+00:00", number: "1", summary: "Initial version", }, { date: "2019-08-06T12:36:51+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T12:43:21+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Client (v. 7)", product: { name: "Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Client Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server (v. 7)", product: { name: "Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation (v. 7)", product: { name: "Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::workstation", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::workstation", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", product: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", product_id: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-debuginfo@2.0.0-1.rc4.el7?arch=x86_64", }, }, }, { category: "product_version", name: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", product: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", product_id: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr-devel@2.0.0-1.rc4.el7?arch=x86_64", }, }, }, { category: "product_version", name: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", product: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", product_id: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-devel@2.0.0-1.rc4.el7?arch=x86_64", }, }, }, { category: "product_version", name: "freerdp-0:2.0.0-1.rc4.el7.x86_64", product: { name: "freerdp-0:2.0.0-1.rc4.el7.x86_64", product_id: "freerdp-0:2.0.0-1.rc4.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp@2.0.0-1.rc4.el7?arch=x86_64", }, }, }, { category: "product_version", name: "libwinpr-0:2.0.0-1.rc4.el7.x86_64", product: { name: "libwinpr-0:2.0.0-1.rc4.el7.x86_64", product_id: "libwinpr-0:2.0.0-1.rc4.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr@2.0.0-1.rc4.el7?arch=x86_64", }, }, }, { category: "product_version", name: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", product: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", product_id: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-libs@2.0.0-1.rc4.el7?arch=x86_64", }, }, }, { category: "product_version", name: "vinagre-0:3.22.0-12.el7.x86_64", product: { name: "vinagre-0:3.22.0-12.el7.x86_64", product_id: "vinagre-0:3.22.0-12.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre@3.22.0-12.el7?arch=x86_64", }, }, }, { category: "product_version", name: "vinagre-debuginfo-0:3.22.0-12.el7.x86_64", product: { name: "vinagre-debuginfo-0:3.22.0-12.el7.x86_64", product_id: "vinagre-debuginfo-0:3.22.0-12.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre-debuginfo@3.22.0-12.el7?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", product: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", product_id: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-debuginfo@2.0.0-1.rc4.el7?arch=i686", }, }, }, { category: "product_version", name: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686", product: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686", product_id: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr-devel@2.0.0-1.rc4.el7?arch=i686", }, }, }, { category: "product_version", name: "freerdp-devel-0:2.0.0-1.rc4.el7.i686", product: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.i686", product_id: "freerdp-devel-0:2.0.0-1.rc4.el7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-devel@2.0.0-1.rc4.el7?arch=i686", }, }, }, { category: "product_version", name: "libwinpr-0:2.0.0-1.rc4.el7.i686", product: { name: "libwinpr-0:2.0.0-1.rc4.el7.i686", product_id: "libwinpr-0:2.0.0-1.rc4.el7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr@2.0.0-1.rc4.el7?arch=i686", }, }, }, { category: "product_version", name: "freerdp-libs-0:2.0.0-1.rc4.el7.i686", product: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.i686", product_id: "freerdp-libs-0:2.0.0-1.rc4.el7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-libs@2.0.0-1.rc4.el7?arch=i686", }, }, }, { category: "product_version", name: "vinagre-0:3.22.0-12.el7.i686", product: { name: "vinagre-0:3.22.0-12.el7.i686", product_id: "vinagre-0:3.22.0-12.el7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre@3.22.0-12.el7?arch=i686", }, }, }, { category: "product_version", name: "vinagre-debuginfo-0:3.22.0-12.el7.i686", product: { name: "vinagre-debuginfo-0:3.22.0-12.el7.i686", product_id: "vinagre-debuginfo-0:3.22.0-12.el7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre-debuginfo@3.22.0-12.el7?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "freerdp-0:2.0.0-1.rc4.el7.src", product: { name: "freerdp-0:2.0.0-1.rc4.el7.src", product_id: "freerdp-0:2.0.0-1.rc4.el7.src", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp@2.0.0-1.rc4.el7?arch=src", }, }, }, { category: "product_version", name: "vinagre-0:3.22.0-12.el7.src", product: { name: "vinagre-0:3.22.0-12.el7.src", product_id: "vinagre-0:3.22.0-12.el7.src", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre@3.22.0-12.el7?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", product: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", product_id: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-debuginfo@2.0.0-1.rc4.el7?arch=ppc", }, }, }, { category: "product_version", name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", product: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", product_id: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr-devel@2.0.0-1.rc4.el7?arch=ppc", }, }, }, { category: "product_version", name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc", product: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc", product_id: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-devel@2.0.0-1.rc4.el7?arch=ppc", }, }, }, { category: "product_version", name: "libwinpr-0:2.0.0-1.rc4.el7.ppc", product: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc", product_id: "libwinpr-0:2.0.0-1.rc4.el7.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr@2.0.0-1.rc4.el7?arch=ppc", }, }, }, { category: "product_version", name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc", product: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc", product_id: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-libs@2.0.0-1.rc4.el7?arch=ppc", }, }, }, { category: "product_version", name: "vinagre-0:3.22.0-12.el7.ppc", product: { name: "vinagre-0:3.22.0-12.el7.ppc", product_id: "vinagre-0:3.22.0-12.el7.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre@3.22.0-12.el7?arch=ppc", }, }, }, { category: "product_version", name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc", product: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc", product_id: "vinagre-debuginfo-0:3.22.0-12.el7.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre-debuginfo@3.22.0-12.el7?arch=ppc", }, }, }, ], category: "architecture", name: "ppc", }, { branches: [ { category: "product_version", name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", product: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", product_id: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-debuginfo@2.0.0-1.rc4.el7?arch=ppc64", }, }, }, { category: "product_version", name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", product: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", product_id: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr-devel@2.0.0-1.rc4.el7?arch=ppc64", }, }, }, { category: "product_version", name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", product: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", product_id: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-devel@2.0.0-1.rc4.el7?arch=ppc64", }, }, }, { category: "product_version", name: "freerdp-0:2.0.0-1.rc4.el7.ppc64", product: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64", product_id: "freerdp-0:2.0.0-1.rc4.el7.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp@2.0.0-1.rc4.el7?arch=ppc64", }, }, }, { category: "product_version", name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64", product: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64", product_id: "libwinpr-0:2.0.0-1.rc4.el7.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr@2.0.0-1.rc4.el7?arch=ppc64", }, }, }, { category: "product_version", name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", product: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", product_id: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-libs@2.0.0-1.rc4.el7?arch=ppc64", }, }, }, { category: "product_version", name: "vinagre-0:3.22.0-12.el7.ppc64", product: { name: "vinagre-0:3.22.0-12.el7.ppc64", product_id: "vinagre-0:3.22.0-12.el7.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre@3.22.0-12.el7?arch=ppc64", }, }, }, { category: "product_version", name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64", product: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64", product_id: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre-debuginfo@3.22.0-12.el7?arch=ppc64", }, }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", product: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", product_id: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-debuginfo@2.0.0-1.rc4.el7?arch=s390", }, }, }, { category: "product_version", name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390", product: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390", product_id: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr-devel@2.0.0-1.rc4.el7?arch=s390", }, }, }, { category: "product_version", name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390", product: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390", product_id: "freerdp-devel-0:2.0.0-1.rc4.el7.s390", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-devel@2.0.0-1.rc4.el7?arch=s390", }, }, }, { category: "product_version", name: "libwinpr-0:2.0.0-1.rc4.el7.s390", product: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390", product_id: "libwinpr-0:2.0.0-1.rc4.el7.s390", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr@2.0.0-1.rc4.el7?arch=s390", }, }, }, { category: "product_version", name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390", product: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390", product_id: "freerdp-libs-0:2.0.0-1.rc4.el7.s390", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-libs@2.0.0-1.rc4.el7?arch=s390", }, }, }, { category: "product_version", name: "vinagre-0:3.22.0-12.el7.s390", product: { name: "vinagre-0:3.22.0-12.el7.s390", product_id: "vinagre-0:3.22.0-12.el7.s390", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre@3.22.0-12.el7?arch=s390", }, }, }, { category: "product_version", name: "vinagre-debuginfo-0:3.22.0-12.el7.s390", product: { name: "vinagre-debuginfo-0:3.22.0-12.el7.s390", product_id: "vinagre-debuginfo-0:3.22.0-12.el7.s390", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre-debuginfo@3.22.0-12.el7?arch=s390", }, }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", product: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", product_id: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-debuginfo@2.0.0-1.rc4.el7?arch=s390x", }, }, }, { category: "product_version", name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", product: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", product_id: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr-devel@2.0.0-1.rc4.el7?arch=s390x", }, }, }, { category: "product_version", name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x", product: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x", product_id: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-devel@2.0.0-1.rc4.el7?arch=s390x", }, }, }, { category: "product_version", name: "freerdp-0:2.0.0-1.rc4.el7.s390x", product: { name: "freerdp-0:2.0.0-1.rc4.el7.s390x", product_id: "freerdp-0:2.0.0-1.rc4.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp@2.0.0-1.rc4.el7?arch=s390x", }, }, }, { category: "product_version", name: "libwinpr-0:2.0.0-1.rc4.el7.s390x", product: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390x", product_id: "libwinpr-0:2.0.0-1.rc4.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr@2.0.0-1.rc4.el7?arch=s390x", }, }, }, { category: "product_version", name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x", product: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x", product_id: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-libs@2.0.0-1.rc4.el7?arch=s390x", }, }, }, { category: "product_version", name: "vinagre-0:3.22.0-12.el7.s390x", product: { name: "vinagre-0:3.22.0-12.el7.s390x", product_id: "vinagre-0:3.22.0-12.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre@3.22.0-12.el7?arch=s390x", }, }, }, { category: "product_version", name: "vinagre-debuginfo-0:3.22.0-12.el7.s390x", product: { name: "vinagre-debuginfo-0:3.22.0-12.el7.s390x", product_id: "vinagre-debuginfo-0:3.22.0-12.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre-debuginfo@3.22.0-12.el7?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", product: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", product_id: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-debuginfo@2.0.0-1.rc4.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", product: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", product_id: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr-devel@2.0.0-1.rc4.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", product: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", product_id: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-devel@2.0.0-1.rc4.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "freerdp-0:2.0.0-1.rc4.el7.ppc64le", product: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64le", product_id: "freerdp-0:2.0.0-1.rc4.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp@2.0.0-1.rc4.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le", product: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le", product_id: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr@2.0.0-1.rc4.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", product: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", product_id: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-libs@2.0.0-1.rc4.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "vinagre-0:3.22.0-12.el7.ppc64le", product: { name: "vinagre-0:3.22.0-12.el7.ppc64le", product_id: "vinagre-0:3.22.0-12.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre@3.22.0-12.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", product: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", product_id: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre-debuginfo@3.22.0-12.el7?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.src", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.src", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-0:3.22.0-12.el7.i686", }, product_reference: "vinagre-0:3.22.0-12.el7.i686", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc", }, product_reference: "vinagre-0:3.22.0-12.el7.ppc", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc64", }, product_reference: "vinagre-0:3.22.0-12.el7.ppc64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc64le", }, product_reference: "vinagre-0:3.22.0-12.el7.ppc64le", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-0:3.22.0-12.el7.s390", }, product_reference: "vinagre-0:3.22.0-12.el7.s390", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-0:3.22.0-12.el7.s390x", }, product_reference: "vinagre-0:3.22.0-12.el7.s390x", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-0:3.22.0-12.el7.src", }, product_reference: "vinagre-0:3.22.0-12.el7.src", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-0:3.22.0-12.el7.x86_64", }, product_reference: "vinagre-0:3.22.0-12.el7.x86_64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.i686", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.ppc", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.s390", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.s390x", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.x86_64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.src", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.src", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.src", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-0:3.22.0-12.el7.i686", }, product_reference: "vinagre-0:3.22.0-12.el7.i686", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc", }, product_reference: "vinagre-0:3.22.0-12.el7.ppc", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc64", }, product_reference: "vinagre-0:3.22.0-12.el7.ppc64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc64le", }, product_reference: "vinagre-0:3.22.0-12.el7.ppc64le", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-0:3.22.0-12.el7.s390", }, product_reference: "vinagre-0:3.22.0-12.el7.s390", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-0:3.22.0-12.el7.s390x", }, product_reference: "vinagre-0:3.22.0-12.el7.s390x", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-0:3.22.0-12.el7.src", }, product_reference: "vinagre-0:3.22.0-12.el7.src", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-0:3.22.0-12.el7.x86_64", }, product_reference: "vinagre-0:3.22.0-12.el7.x86_64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.i686", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.ppc", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.s390", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.s390x", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.x86_64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.src", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.src", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.src", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-0:3.22.0-12.el7.i686", }, product_reference: "vinagre-0:3.22.0-12.el7.i686", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc", }, product_reference: "vinagre-0:3.22.0-12.el7.ppc", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc64", }, product_reference: "vinagre-0:3.22.0-12.el7.ppc64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc64le", }, product_reference: "vinagre-0:3.22.0-12.el7.ppc64le", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-0:3.22.0-12.el7.s390", }, product_reference: "vinagre-0:3.22.0-12.el7.s390", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-0:3.22.0-12.el7.s390x", }, product_reference: "vinagre-0:3.22.0-12.el7.s390x", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-0:3.22.0-12.el7.src", }, product_reference: "vinagre-0:3.22.0-12.el7.src", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-0:3.22.0-12.el7.x86_64", }, product_reference: "vinagre-0:3.22.0-12.el7.x86_64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.i686", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.ppc", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.s390", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.s390x", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.x86_64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.src", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-optional-7.7", }, ], }, vulnerabilities: [ { cve: "CVE-2018-1000852", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2018-12-20T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1661640", }, ], notes: [ { category: "description", text: "FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via RDPClient must connect the rdp server with echo option. This vulnerability appears to have been fixed in after commit 205c612820dac644d665b5bb1cdf437dc5ca01e3.", title: "Vulnerability description", }, { category: "summary", text: "freerdp: out of bounds read in drdynvc_process_capability_request", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:vinagre-0:3.22.0-12.el7.i686", "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc", "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc64", "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc64le", "7Client-7.7:vinagre-0:3.22.0-12.el7.s390", "7Client-7.7:vinagre-0:3.22.0-12.el7.s390x", "7Client-7.7:vinagre-0:3.22.0-12.el7.src", "7Client-7.7:vinagre-0:3.22.0-12.el7.x86_64", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:vinagre-0:3.22.0-12.el7.i686", "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc", "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc64", "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc64le", "7Server-7.7:vinagre-0:3.22.0-12.el7.s390", "7Server-7.7:vinagre-0:3.22.0-12.el7.s390x", "7Server-7.7:vinagre-0:3.22.0-12.el7.src", "7Server-7.7:vinagre-0:3.22.0-12.el7.x86_64", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.i686", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc64", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc64le", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.s390", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.s390x", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.src", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.x86_64", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1000852", }, { category: "external", summary: "RHBZ#1661640", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1661640", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1000852", url: "https://www.cve.org/CVERecord?id=CVE-2018-1000852", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000852", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000852", }, ], release_date: "2018-09-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-08-06T12:36:51+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:vinagre-0:3.22.0-12.el7.i686", "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc", "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc64", "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc64le", "7Client-7.7:vinagre-0:3.22.0-12.el7.s390", "7Client-7.7:vinagre-0:3.22.0-12.el7.s390x", "7Client-7.7:vinagre-0:3.22.0-12.el7.src", "7Client-7.7:vinagre-0:3.22.0-12.el7.x86_64", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:vinagre-0:3.22.0-12.el7.i686", "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc", "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc64", "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc64le", "7Server-7.7:vinagre-0:3.22.0-12.el7.s390", "7Server-7.7:vinagre-0:3.22.0-12.el7.s390x", "7Server-7.7:vinagre-0:3.22.0-12.el7.src", "7Server-7.7:vinagre-0:3.22.0-12.el7.x86_64", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.i686", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc64", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc64le", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.s390", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.s390x", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.src", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.x86_64", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:2157", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:vinagre-0:3.22.0-12.el7.i686", "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc", "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc64", "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc64le", "7Client-7.7:vinagre-0:3.22.0-12.el7.s390", "7Client-7.7:vinagre-0:3.22.0-12.el7.s390x", "7Client-7.7:vinagre-0:3.22.0-12.el7.src", "7Client-7.7:vinagre-0:3.22.0-12.el7.x86_64", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:vinagre-0:3.22.0-12.el7.i686", "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc", "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc64", "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc64le", "7Server-7.7:vinagre-0:3.22.0-12.el7.s390", "7Server-7.7:vinagre-0:3.22.0-12.el7.s390x", "7Server-7.7:vinagre-0:3.22.0-12.el7.src", "7Server-7.7:vinagre-0:3.22.0-12.el7.x86_64", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.i686", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc64", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc64le", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.s390", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.s390x", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.src", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.x86_64", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "freerdp: out of bounds read in drdynvc_process_capability_request", }, ], }
rhsa-2019_2157
Vulnerability from csaf_redhat
Published
2019-08-06 12:36
Modified
2024-11-22 12:43
Summary
Red Hat Security Advisory: freerdp and vinagre security, bug fix, and enhancement update
Notes
Topic
An update for freerdp and vinagre is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.
The vinagre packages provide the Vinagre remote desktop viewer for the GNOME desktop.
The following packages have been upgraded to a later upstream version: freerdp (2.0.0). (BZ#1291254)
Security Fix(es):
* freerdp: out of bounds read in drdynvc_process_capability_request (CVE-2018-1000852)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.7 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Low", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for freerdp and vinagre is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.\n\nThe vinagre packages provide the Vinagre remote desktop viewer for the GNOME desktop.\n\nThe following packages have been upgraded to a later upstream version: freerdp (2.0.0). (BZ#1291254)\n\nSecurity Fix(es):\n\n* freerdp: out of bounds read in drdynvc_process_capability_request (CVE-2018-1000852)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.7 Release Notes linked from the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2019:2157", url: "https://access.redhat.com/errata/RHSA-2019:2157", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#low", url: "https://access.redhat.com/security/updates/classification/#low", }, { category: "external", summary: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.7_release_notes/index", url: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.7_release_notes/index", }, { category: "external", summary: "1291254", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1291254", }, { category: "external", summary: "1569552", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1569552", }, { category: "external", summary: "1661640", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1661640", }, { category: "external", summary: "1680229", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1680229", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2157.json", }, ], title: "Red Hat Security Advisory: freerdp and vinagre security, bug fix, and enhancement update", tracking: { current_release_date: "2024-11-22T12:43:21+00:00", generator: { date: "2024-11-22T12:43:21+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2019:2157", initial_release_date: "2019-08-06T12:36:51+00:00", revision_history: [ { date: "2019-08-06T12:36:51+00:00", number: "1", summary: "Initial version", }, { date: "2019-08-06T12:36:51+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T12:43:21+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Client (v. 7)", product: { name: "Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Client Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server (v. 7)", product: { name: "Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation (v. 7)", product: { name: "Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::workstation", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::workstation", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", product: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", product_id: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-debuginfo@2.0.0-1.rc4.el7?arch=x86_64", }, }, }, { category: "product_version", name: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", product: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", product_id: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr-devel@2.0.0-1.rc4.el7?arch=x86_64", }, }, }, { category: "product_version", name: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", product: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", product_id: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-devel@2.0.0-1.rc4.el7?arch=x86_64", }, }, }, { category: "product_version", name: "freerdp-0:2.0.0-1.rc4.el7.x86_64", product: { name: "freerdp-0:2.0.0-1.rc4.el7.x86_64", product_id: "freerdp-0:2.0.0-1.rc4.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp@2.0.0-1.rc4.el7?arch=x86_64", }, }, }, { category: "product_version", name: "libwinpr-0:2.0.0-1.rc4.el7.x86_64", product: { name: "libwinpr-0:2.0.0-1.rc4.el7.x86_64", product_id: "libwinpr-0:2.0.0-1.rc4.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr@2.0.0-1.rc4.el7?arch=x86_64", }, }, }, { category: "product_version", name: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", product: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", product_id: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-libs@2.0.0-1.rc4.el7?arch=x86_64", }, }, }, { category: "product_version", name: "vinagre-0:3.22.0-12.el7.x86_64", product: { name: "vinagre-0:3.22.0-12.el7.x86_64", product_id: "vinagre-0:3.22.0-12.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre@3.22.0-12.el7?arch=x86_64", }, }, }, { category: "product_version", name: "vinagre-debuginfo-0:3.22.0-12.el7.x86_64", product: { name: "vinagre-debuginfo-0:3.22.0-12.el7.x86_64", product_id: "vinagre-debuginfo-0:3.22.0-12.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre-debuginfo@3.22.0-12.el7?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", product: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", product_id: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-debuginfo@2.0.0-1.rc4.el7?arch=i686", }, }, }, { category: "product_version", name: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686", product: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686", product_id: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr-devel@2.0.0-1.rc4.el7?arch=i686", }, }, }, { category: "product_version", name: "freerdp-devel-0:2.0.0-1.rc4.el7.i686", product: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.i686", product_id: "freerdp-devel-0:2.0.0-1.rc4.el7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-devel@2.0.0-1.rc4.el7?arch=i686", }, }, }, { category: "product_version", name: "libwinpr-0:2.0.0-1.rc4.el7.i686", product: { name: "libwinpr-0:2.0.0-1.rc4.el7.i686", product_id: "libwinpr-0:2.0.0-1.rc4.el7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr@2.0.0-1.rc4.el7?arch=i686", }, }, }, { category: "product_version", name: "freerdp-libs-0:2.0.0-1.rc4.el7.i686", product: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.i686", product_id: "freerdp-libs-0:2.0.0-1.rc4.el7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-libs@2.0.0-1.rc4.el7?arch=i686", }, }, }, { category: "product_version", name: "vinagre-0:3.22.0-12.el7.i686", product: { name: "vinagre-0:3.22.0-12.el7.i686", product_id: "vinagre-0:3.22.0-12.el7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre@3.22.0-12.el7?arch=i686", }, }, }, { category: "product_version", name: "vinagre-debuginfo-0:3.22.0-12.el7.i686", product: { name: "vinagre-debuginfo-0:3.22.0-12.el7.i686", product_id: "vinagre-debuginfo-0:3.22.0-12.el7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre-debuginfo@3.22.0-12.el7?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "freerdp-0:2.0.0-1.rc4.el7.src", product: { name: "freerdp-0:2.0.0-1.rc4.el7.src", product_id: "freerdp-0:2.0.0-1.rc4.el7.src", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp@2.0.0-1.rc4.el7?arch=src", }, }, }, { category: "product_version", name: "vinagre-0:3.22.0-12.el7.src", product: { name: "vinagre-0:3.22.0-12.el7.src", product_id: "vinagre-0:3.22.0-12.el7.src", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre@3.22.0-12.el7?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", product: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", product_id: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-debuginfo@2.0.0-1.rc4.el7?arch=ppc", }, }, }, { category: "product_version", name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", product: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", product_id: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr-devel@2.0.0-1.rc4.el7?arch=ppc", }, }, }, { category: "product_version", name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc", product: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc", product_id: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-devel@2.0.0-1.rc4.el7?arch=ppc", }, }, }, { category: "product_version", name: "libwinpr-0:2.0.0-1.rc4.el7.ppc", product: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc", product_id: "libwinpr-0:2.0.0-1.rc4.el7.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr@2.0.0-1.rc4.el7?arch=ppc", }, }, }, { category: "product_version", name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc", product: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc", product_id: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-libs@2.0.0-1.rc4.el7?arch=ppc", }, }, }, { category: "product_version", name: "vinagre-0:3.22.0-12.el7.ppc", product: { name: "vinagre-0:3.22.0-12.el7.ppc", product_id: "vinagre-0:3.22.0-12.el7.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre@3.22.0-12.el7?arch=ppc", }, }, }, { category: "product_version", name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc", product: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc", product_id: "vinagre-debuginfo-0:3.22.0-12.el7.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre-debuginfo@3.22.0-12.el7?arch=ppc", }, }, }, ], category: "architecture", name: "ppc", }, { branches: [ { category: "product_version", name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", product: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", product_id: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-debuginfo@2.0.0-1.rc4.el7?arch=ppc64", }, }, }, { category: "product_version", name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", product: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", product_id: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr-devel@2.0.0-1.rc4.el7?arch=ppc64", }, }, }, { category: "product_version", name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", product: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", product_id: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-devel@2.0.0-1.rc4.el7?arch=ppc64", }, }, }, { category: "product_version", name: "freerdp-0:2.0.0-1.rc4.el7.ppc64", product: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64", product_id: "freerdp-0:2.0.0-1.rc4.el7.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp@2.0.0-1.rc4.el7?arch=ppc64", }, }, }, { category: "product_version", name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64", product: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64", product_id: "libwinpr-0:2.0.0-1.rc4.el7.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr@2.0.0-1.rc4.el7?arch=ppc64", }, }, }, { category: "product_version", name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", product: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", product_id: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-libs@2.0.0-1.rc4.el7?arch=ppc64", }, }, }, { category: "product_version", name: "vinagre-0:3.22.0-12.el7.ppc64", product: { name: "vinagre-0:3.22.0-12.el7.ppc64", product_id: "vinagre-0:3.22.0-12.el7.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre@3.22.0-12.el7?arch=ppc64", }, }, }, { category: "product_version", name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64", product: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64", product_id: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre-debuginfo@3.22.0-12.el7?arch=ppc64", }, }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", product: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", product_id: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-debuginfo@2.0.0-1.rc4.el7?arch=s390", }, }, }, { category: "product_version", name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390", product: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390", product_id: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr-devel@2.0.0-1.rc4.el7?arch=s390", }, }, }, { category: "product_version", name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390", product: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390", product_id: "freerdp-devel-0:2.0.0-1.rc4.el7.s390", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-devel@2.0.0-1.rc4.el7?arch=s390", }, }, }, { category: "product_version", name: "libwinpr-0:2.0.0-1.rc4.el7.s390", product: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390", product_id: "libwinpr-0:2.0.0-1.rc4.el7.s390", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr@2.0.0-1.rc4.el7?arch=s390", }, }, }, { category: "product_version", name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390", product: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390", product_id: "freerdp-libs-0:2.0.0-1.rc4.el7.s390", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-libs@2.0.0-1.rc4.el7?arch=s390", }, }, }, { category: "product_version", name: "vinagre-0:3.22.0-12.el7.s390", product: { name: "vinagre-0:3.22.0-12.el7.s390", product_id: "vinagre-0:3.22.0-12.el7.s390", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre@3.22.0-12.el7?arch=s390", }, }, }, { category: "product_version", name: "vinagre-debuginfo-0:3.22.0-12.el7.s390", product: { name: "vinagre-debuginfo-0:3.22.0-12.el7.s390", product_id: "vinagre-debuginfo-0:3.22.0-12.el7.s390", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre-debuginfo@3.22.0-12.el7?arch=s390", }, }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", product: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", product_id: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-debuginfo@2.0.0-1.rc4.el7?arch=s390x", }, }, }, { category: "product_version", name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", product: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", product_id: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr-devel@2.0.0-1.rc4.el7?arch=s390x", }, }, }, { category: "product_version", name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x", product: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x", product_id: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-devel@2.0.0-1.rc4.el7?arch=s390x", }, }, }, { category: "product_version", name: "freerdp-0:2.0.0-1.rc4.el7.s390x", product: { name: "freerdp-0:2.0.0-1.rc4.el7.s390x", product_id: "freerdp-0:2.0.0-1.rc4.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp@2.0.0-1.rc4.el7?arch=s390x", }, }, }, { category: "product_version", name: "libwinpr-0:2.0.0-1.rc4.el7.s390x", product: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390x", product_id: "libwinpr-0:2.0.0-1.rc4.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr@2.0.0-1.rc4.el7?arch=s390x", }, }, }, { category: "product_version", name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x", product: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x", product_id: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-libs@2.0.0-1.rc4.el7?arch=s390x", }, }, }, { category: "product_version", name: "vinagre-0:3.22.0-12.el7.s390x", product: { name: "vinagre-0:3.22.0-12.el7.s390x", product_id: "vinagre-0:3.22.0-12.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre@3.22.0-12.el7?arch=s390x", }, }, }, { category: "product_version", name: "vinagre-debuginfo-0:3.22.0-12.el7.s390x", product: { name: "vinagre-debuginfo-0:3.22.0-12.el7.s390x", product_id: "vinagre-debuginfo-0:3.22.0-12.el7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre-debuginfo@3.22.0-12.el7?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", product: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", product_id: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-debuginfo@2.0.0-1.rc4.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", product: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", product_id: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr-devel@2.0.0-1.rc4.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", product: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", product_id: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-devel@2.0.0-1.rc4.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "freerdp-0:2.0.0-1.rc4.el7.ppc64le", product: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64le", product_id: "freerdp-0:2.0.0-1.rc4.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp@2.0.0-1.rc4.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le", product: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le", product_id: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/libwinpr@2.0.0-1.rc4.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", product: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", product_id: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/freerdp-libs@2.0.0-1.rc4.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "vinagre-0:3.22.0-12.el7.ppc64le", product: { name: "vinagre-0:3.22.0-12.el7.ppc64le", product_id: "vinagre-0:3.22.0-12.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre@3.22.0-12.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", product: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", product_id: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/vinagre-debuginfo@3.22.0-12.el7?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.src", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.src", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-0:3.22.0-12.el7.i686", }, product_reference: "vinagre-0:3.22.0-12.el7.i686", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc", }, product_reference: "vinagre-0:3.22.0-12.el7.ppc", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc64", }, product_reference: "vinagre-0:3.22.0-12.el7.ppc64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc64le", }, product_reference: "vinagre-0:3.22.0-12.el7.ppc64le", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-0:3.22.0-12.el7.s390", }, product_reference: "vinagre-0:3.22.0-12.el7.s390", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-0:3.22.0-12.el7.s390x", }, product_reference: "vinagre-0:3.22.0-12.el7.s390x", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-0:3.22.0-12.el7.src", }, product_reference: "vinagre-0:3.22.0-12.el7.src", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-0:3.22.0-12.el7.x86_64", }, product_reference: "vinagre-0:3.22.0-12.el7.x86_64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.i686", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.ppc", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.s390", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.s390x", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.x86_64", relates_to_product_reference: "7Client-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.src", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Client-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.src", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.src", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-0:3.22.0-12.el7.i686", }, product_reference: "vinagre-0:3.22.0-12.el7.i686", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc", }, product_reference: "vinagre-0:3.22.0-12.el7.ppc", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc64", }, product_reference: "vinagre-0:3.22.0-12.el7.ppc64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc64le", }, product_reference: "vinagre-0:3.22.0-12.el7.ppc64le", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-0:3.22.0-12.el7.s390", }, product_reference: "vinagre-0:3.22.0-12.el7.s390", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-0:3.22.0-12.el7.s390x", }, product_reference: "vinagre-0:3.22.0-12.el7.s390x", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-0:3.22.0-12.el7.src", }, product_reference: "vinagre-0:3.22.0-12.el7.src", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-0:3.22.0-12.el7.x86_64", }, product_reference: "vinagre-0:3.22.0-12.el7.x86_64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.i686", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.ppc", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.s390", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.s390x", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.x86_64", relates_to_product_reference: "7Server-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.src", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Server-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.src", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.src", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-0:3.22.0-12.el7.i686", }, product_reference: "vinagre-0:3.22.0-12.el7.i686", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc", }, product_reference: "vinagre-0:3.22.0-12.el7.ppc", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc64", }, product_reference: "vinagre-0:3.22.0-12.el7.ppc64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc64le", }, product_reference: "vinagre-0:3.22.0-12.el7.ppc64le", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-0:3.22.0-12.el7.s390", }, product_reference: "vinagre-0:3.22.0-12.el7.s390", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-0:3.22.0-12.el7.s390x", }, product_reference: "vinagre-0:3.22.0-12.el7.s390x", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-0:3.22.0-12.el7.src", }, product_reference: "vinagre-0:3.22.0-12.el7.src", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-0:3.22.0-12.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-0:3.22.0-12.el7.x86_64", }, product_reference: "vinagre-0:3.22.0-12.el7.x86_64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.i686", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.ppc", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.s390", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.s390x", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "vinagre-debuginfo-0:3.22.0-12.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", }, product_reference: "vinagre-debuginfo-0:3.22.0-12.el7.x86_64", relates_to_product_reference: "7Workstation-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.src", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.i686", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", relates_to_product_reference: "7Workstation-optional-7.7", }, { category: "default_component_of", full_product_name: { name: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", }, product_reference: "libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", relates_to_product_reference: "7Workstation-optional-7.7", }, ], }, vulnerabilities: [ { cve: "CVE-2018-1000852", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, discovery_date: "2018-12-20T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1661640", }, ], notes: [ { category: "description", text: "FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via RDPClient must connect the rdp server with echo option. This vulnerability appears to have been fixed in after commit 205c612820dac644d665b5bb1cdf437dc5ca01e3.", title: "Vulnerability description", }, { category: "summary", text: "freerdp: out of bounds read in drdynvc_process_capability_request", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:vinagre-0:3.22.0-12.el7.i686", "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc", "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc64", "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc64le", "7Client-7.7:vinagre-0:3.22.0-12.el7.s390", "7Client-7.7:vinagre-0:3.22.0-12.el7.s390x", "7Client-7.7:vinagre-0:3.22.0-12.el7.src", "7Client-7.7:vinagre-0:3.22.0-12.el7.x86_64", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:vinagre-0:3.22.0-12.el7.i686", "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc", "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc64", "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc64le", "7Server-7.7:vinagre-0:3.22.0-12.el7.s390", "7Server-7.7:vinagre-0:3.22.0-12.el7.s390x", "7Server-7.7:vinagre-0:3.22.0-12.el7.src", "7Server-7.7:vinagre-0:3.22.0-12.el7.x86_64", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.i686", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc64", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc64le", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.s390", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.s390x", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.src", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.x86_64", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-1000852", }, { category: "external", summary: "RHBZ#1661640", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1661640", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-1000852", url: "https://www.cve.org/CVERecord?id=CVE-2018-1000852", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000852", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000852", }, ], release_date: "2018-09-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2019-08-06T12:36:51+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:vinagre-0:3.22.0-12.el7.i686", "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc", "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc64", "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc64le", "7Client-7.7:vinagre-0:3.22.0-12.el7.s390", "7Client-7.7:vinagre-0:3.22.0-12.el7.s390x", "7Client-7.7:vinagre-0:3.22.0-12.el7.src", "7Client-7.7:vinagre-0:3.22.0-12.el7.x86_64", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:vinagre-0:3.22.0-12.el7.i686", "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc", "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc64", "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc64le", "7Server-7.7:vinagre-0:3.22.0-12.el7.s390", "7Server-7.7:vinagre-0:3.22.0-12.el7.s390x", "7Server-7.7:vinagre-0:3.22.0-12.el7.src", "7Server-7.7:vinagre-0:3.22.0-12.el7.x86_64", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.i686", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc64", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc64le", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.s390", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.s390x", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.src", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.x86_64", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2019:2157", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Client-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Client-7.7:vinagre-0:3.22.0-12.el7.i686", "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc", "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc64", "7Client-7.7:vinagre-0:3.22.0-12.el7.ppc64le", "7Client-7.7:vinagre-0:3.22.0-12.el7.s390", "7Client-7.7:vinagre-0:3.22.0-12.el7.s390x", "7Client-7.7:vinagre-0:3.22.0-12.el7.src", "7Client-7.7:vinagre-0:3.22.0-12.el7.x86_64", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", "7Client-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Client-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Client-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Server-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-7.7:vinagre-0:3.22.0-12.el7.i686", "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc", "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc64", "7Server-7.7:vinagre-0:3.22.0-12.el7.ppc64le", "7Server-7.7:vinagre-0:3.22.0-12.el7.s390", "7Server-7.7:vinagre-0:3.22.0-12.el7.s390x", "7Server-7.7:vinagre-0:3.22.0-12.el7.src", "7Server-7.7:vinagre-0:3.22.0-12.el7.x86_64", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", "7Server-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Server-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Server-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Workstation-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.i686", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc64", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.ppc64le", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.s390", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.s390x", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.src", "7Workstation-7.7:vinagre-0:3.22.0-12.el7.x86_64", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.i686", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.ppc64le", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.s390x", "7Workstation-7.7:vinagre-debuginfo-0:3.22.0-12.el7.x86_64", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.src", "7Workstation-optional-7.7:freerdp-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-debuginfo-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-devel-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:freerdp-libs-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:libwinpr-0:2.0.0-1.rc4.el7.x86_64", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.i686", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.ppc64le", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.s390x", "7Workstation-optional-7.7:libwinpr-devel-0:2.0.0-1.rc4.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "freerdp: out of bounds read in drdynvc_process_capability_request", }, ], }
suse-su-2019:0134-1
Vulnerability from csaf_suse
Published
2019-01-21 12:51
Modified
2019-01-21 12:51
Summary
Security update for freerdp
Notes
Title of the patch
Security update for freerdp
Description of the patch
This update for freerdp fixes the following issues:
Security issues fixed:
- CVE-2018-0886: Fix a remote code execution vulnerability (CredSSP) (bsc#1085416, bsc#1087240, bsc#1104918)
- CVE-2018-8789: Fix several denial of service vulnerabilities in the in the NTLM Authentication module (bsc#1117965)
- CVE-2018-8785: Fix a potential remote code execution vulnerability in the zgfx_decompress function (bsc#1117967)
- CVE-2018-8786: Fix a potential remote code execution vulnerability in the update_read_bitmap_update function (bsc#1117966)
- CVE-2018-8787: Fix a potential remote code execution vulnerability in the gdi_Bitmap_Decompress function (bsc#1117964)
- CVE-2018-8788: Fix a potential remote code execution vulnerability in the nsc_rle_decode function (bsc#1117963)
- CVE-2018-8784: Fix a potential remote code execution vulnerability in the zgfx_decompress_segment function (bsc#1116708)
- CVE-2018-1000852: Fixed a remote memory access in the drdynvc_process_capability_request function (bsc#1120507)
Patchnames
SUSE-2019-134,SUSE-SLE-DESKTOP-12-SP3-2019-134,SUSE-SLE-DESKTOP-12-SP4-2019-134,SUSE-SLE-SDK-12-SP3-2019-134,SUSE-SLE-SDK-12-SP4-2019-134,SUSE-SLE-WE-12-SP3-2019-134,SUSE-SLE-WE-12-SP4-2019-134
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for freerdp", title: "Title of the patch", }, { category: "description", text: "This update for freerdp fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2018-0886: Fix a remote code execution vulnerability (CredSSP) (bsc#1085416, bsc#1087240, bsc#1104918)\n- CVE-2018-8789: Fix several denial of service vulnerabilities in the in the NTLM Authentication module (bsc#1117965)\n- CVE-2018-8785: Fix a potential remote code execution vulnerability in the zgfx_decompress function (bsc#1117967)\n- CVE-2018-8786: Fix a potential remote code execution vulnerability in the update_read_bitmap_update function (bsc#1117966)\n- CVE-2018-8787: Fix a potential remote code execution vulnerability in the gdi_Bitmap_Decompress function (bsc#1117964)\n- CVE-2018-8788: Fix a potential remote code execution vulnerability in the nsc_rle_decode function (bsc#1117963)\n- CVE-2018-8784: Fix a potential remote code execution vulnerability in the zgfx_decompress_segment function (bsc#1116708)\n- CVE-2018-1000852: Fixed a remote memory access in the drdynvc_process_capability_request function (bsc#1120507)\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-134,SUSE-SLE-DESKTOP-12-SP3-2019-134,SUSE-SLE-DESKTOP-12-SP4-2019-134,SUSE-SLE-SDK-12-SP3-2019-134,SUSE-SLE-SDK-12-SP4-2019-134,SUSE-SLE-WE-12-SP3-2019-134,SUSE-SLE-WE-12-SP4-2019-134", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0134-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:0134-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20190134-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:0134-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-January/005053.html", }, { category: "self", summary: "SUSE Bug 1085416", url: "https://bugzilla.suse.com/1085416", }, { category: "self", summary: "SUSE Bug 1087240", url: "https://bugzilla.suse.com/1087240", }, { category: "self", summary: "SUSE Bug 1104918", url: "https://bugzilla.suse.com/1104918", }, { category: "self", summary: "SUSE Bug 1116708", url: "https://bugzilla.suse.com/1116708", }, { category: "self", summary: "SUSE Bug 1117963", url: "https://bugzilla.suse.com/1117963", }, { category: "self", summary: "SUSE Bug 1117964", url: "https://bugzilla.suse.com/1117964", }, { category: "self", summary: "SUSE Bug 1117965", url: "https://bugzilla.suse.com/1117965", }, { category: "self", summary: "SUSE Bug 1117966", url: "https://bugzilla.suse.com/1117966", }, { category: "self", summary: "SUSE Bug 1117967", url: "https://bugzilla.suse.com/1117967", }, { category: "self", summary: "SUSE Bug 1120507", url: "https://bugzilla.suse.com/1120507", }, { category: "self", summary: "SUSE CVE CVE-2018-0886 page", url: "https://www.suse.com/security/cve/CVE-2018-0886/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000852 page", url: "https://www.suse.com/security/cve/CVE-2018-1000852/", }, { category: "self", summary: "SUSE CVE CVE-2018-8784 page", url: "https://www.suse.com/security/cve/CVE-2018-8784/", }, { category: "self", summary: "SUSE CVE CVE-2018-8785 page", url: "https://www.suse.com/security/cve/CVE-2018-8785/", }, { category: "self", summary: "SUSE CVE CVE-2018-8786 page", url: "https://www.suse.com/security/cve/CVE-2018-8786/", }, { category: "self", summary: "SUSE CVE CVE-2018-8787 page", url: "https://www.suse.com/security/cve/CVE-2018-8787/", }, { category: "self", summary: "SUSE CVE CVE-2018-8788 page", url: "https://www.suse.com/security/cve/CVE-2018-8788/", }, { category: "self", summary: "SUSE CVE CVE-2018-8789 page", url: "https://www.suse.com/security/cve/CVE-2018-8789/", }, ], title: "Security update for freerdp", tracking: { current_release_date: "2019-01-21T12:51:05Z", generator: { date: "2019-01-21T12:51:05Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:0134-1", initial_release_date: "2019-01-21T12:51:05Z", revision_history: [ { date: "2019-01-21T12:51:05Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", product: { name: "freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", product_id: "freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", }, }, { category: "product_version", name: "freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", product: { name: "freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", product_id: "freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", }, }, { category: "product_version", name: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", product: { name: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", product_id: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.i586", product: { name: "freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.i586", product_id: "freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.i586", }, }, { category: "product_version", name: "freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.i586", product: { name: "freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.i586", product_id: "freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.i586", }, }, { category: "product_version", name: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.i586", product: { name: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.i586", product_id: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", product: { name: "freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", product_id: "freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", }, }, { category: "product_version", name: "freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", product: { name: "freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", product_id: "freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", }, }, { category: "product_version", name: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", product: { name: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", product_id: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.s390", product: { name: "freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.s390", product_id: "freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.s390", }, }, { category: "product_version", name: "freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390", product: { name: "freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390", product_id: "freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390", }, }, { category: "product_version", name: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390", product: { name: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390", product_id: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390", }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", product: { name: "freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", product_id: "freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", }, }, { category: "product_version", name: "freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", product: { name: "freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", product_id: "freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", }, }, { category: "product_version", name: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", product: { name: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", product_id: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", product: { name: "freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", product_id: "freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", }, }, { category: "product_version", name: "freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", product: { name: "freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", product_id: "freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", }, }, { category: "product_version", name: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", product: { name: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", product_id: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Desktop 12 SP3", product: { name: "SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sled:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Desktop 12 SP4", product: { name: "SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sled:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP3", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP4", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 12 SP3", product: { name: "SUSE Linux Enterprise Workstation Extension 12 SP3", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 12 SP4", product: { name: "SUSE Linux Enterprise Workstation Extension 12 SP4", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:12:sp4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", }, product_reference: "freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", }, product_reference: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", }, product_reference: "freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", }, product_reference: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP4", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", }, product_reference: "freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", }, product_reference: "freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", }, product_reference: "freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", }, product_reference: "freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", }, product_reference: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", }, product_reference: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", }, product_reference: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", }, product_reference: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", }, product_reference: "freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", }, product_reference: "freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", }, product_reference: "freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", }, product_reference: "freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", }, product_reference: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", }, product_reference: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", }, product_reference: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", }, product_reference: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP3", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", }, product_reference: "freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP3", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", }, product_reference: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP4", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", }, product_reference: "freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP4", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", }, product_reference: "libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 12 SP4", }, ], }, vulnerabilities: [ { cve: "CVE-2018-0886", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-0886", }, ], notes: [ { category: "general", text: "The Credential Security Support Provider protocol (CredSSP) in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709 Windows Server 2016 and Windows Server, version 1709 allows a remote code execution vulnerability due to how CredSSP validates request during the authentication process, aka \"CredSSP Remote Code Execution Vulnerability\".", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-0886", url: "https://www.suse.com/security/cve/CVE-2018-0886", }, { category: "external", summary: "SUSE Bug 1085416 for CVE-2018-0886", url: "https://bugzilla.suse.com/1085416", }, { category: "external", summary: "SUSE Bug 1087240 for CVE-2018-0886", url: "https://bugzilla.suse.com/1087240", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-0886", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-0886", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-01-21T12:51:05Z", details: "important", }, ], title: "CVE-2018-0886", }, { cve: "CVE-2018-1000852", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000852", }, ], notes: [ { category: "general", text: "FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via RDPClient must connect the rdp server with echo option. This vulnerability appears to have been fixed in after commit 205c612820dac644d665b5bb1cdf437dc5ca01e3.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000852", url: "https://www.suse.com/security/cve/CVE-2018-1000852", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-1000852", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1120507 for CVE-2018-1000852", url: "https://bugzilla.suse.com/1120507", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-1000852", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-01-21T12:51:05Z", details: "moderate", }, ], title: "CVE-2018-1000852", }, { cve: "CVE-2018-8784", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8784", }, ], notes: [ { category: "general", text: "FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress_segment() that results in a memory corruption and probably even a remote code execution.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8784", url: "https://www.suse.com/security/cve/CVE-2018-8784", }, { category: "external", summary: "SUSE Bug 1116708 for CVE-2018-8784", url: "https://bugzilla.suse.com/1116708", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-8784", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-8784", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-01-21T12:51:05Z", details: "important", }, ], title: "CVE-2018-8784", }, { cve: "CVE-2018-8785", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8785", }, ], notes: [ { category: "general", text: "FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress() that results in a memory corruption and probably even a remote code execution.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8785", url: "https://www.suse.com/security/cve/CVE-2018-8785", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-8785", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1117967 for CVE-2018-8785", url: "https://bugzilla.suse.com/1117967", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-8785", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-01-21T12:51:05Z", details: "important", }, ], title: "CVE-2018-8785", }, { cve: "CVE-2018-8786", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8786", }, ], notes: [ { category: "general", text: "FreeRDP prior to version 2.0.0-rc4 contains an Integer Truncation that leads to a Heap-Based Buffer Overflow in function update_read_bitmap_update() and results in a memory corruption and probably even a remote code execution.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8786", url: "https://www.suse.com/security/cve/CVE-2018-8786", }, { category: "external", summary: "SUSE Bug 1116708 for CVE-2018-8786", url: "https://bugzilla.suse.com/1116708", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-8786", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1117966 for CVE-2018-8786", url: "https://bugzilla.suse.com/1117966", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-8786", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-01-21T12:51:05Z", details: "important", }, ], title: "CVE-2018-8786", }, { cve: "CVE-2018-8787", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8787", }, ], notes: [ { category: "general", text: "FreeRDP prior to version 2.0.0-rc4 contains an Integer Overflow that leads to a Heap-Based Buffer Overflow in function gdi_Bitmap_Decompress() and results in a memory corruption and probably even a remote code execution.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8787", url: "https://www.suse.com/security/cve/CVE-2018-8787", }, { category: "external", summary: "SUSE Bug 1116708 for CVE-2018-8787", url: "https://bugzilla.suse.com/1116708", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-8787", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1117964 for CVE-2018-8787", url: "https://bugzilla.suse.com/1117964", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-8787", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-01-21T12:51:05Z", details: "important", }, ], title: "CVE-2018-8787", }, { cve: "CVE-2018-8788", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8788", }, ], notes: [ { category: "general", text: "FreeRDP prior to version 2.0.0-rc4 contains an Out-Of-Bounds Write of up to 4 bytes in function nsc_rle_decode() that results in a memory corruption and possibly even a remote code execution.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8788", url: "https://www.suse.com/security/cve/CVE-2018-8788", }, { category: "external", summary: "SUSE Bug 1116708 for CVE-2018-8788", url: "https://bugzilla.suse.com/1116708", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-8788", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-8788", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-01-21T12:51:05Z", details: "important", }, ], title: "CVE-2018-8788", }, { cve: "CVE-2018-8789", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8789", }, ], notes: [ { category: "general", text: "FreeRDP prior to version 2.0.0-rc4 contains several Out-Of-Bounds Reads in the NTLM Authentication module that results in a Denial of Service (segfault).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8789", url: "https://www.suse.com/security/cve/CVE-2018-8789", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-8789", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1117965 for CVE-2018-8789", url: "https://bugzilla.suse.com/1117965", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-8789", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:freerdp-devel-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:freerdp-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:libfreerdp2-2.0.0~git.1463131968.4e66df7-12.8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-01-21T12:51:05Z", details: "moderate", }, ], title: "CVE-2018-8789", }, ], }
suse-su-2019:0539-1
Vulnerability from csaf_suse
Published
2019-03-04 16:42
Modified
2019-03-04 16:42
Summary
Security update for freerdp
Notes
Title of the patch
Security update for freerdp
Description of the patch
This update for freerdp to version 2.0.0~rc4 fixes the following issues:
Security issues fixed:
- CVE-2018-0886: Fix a remote code execution vulnerability (CredSSP) (bsc#1085416, bsc#1087240, bsc#1104918)
- CVE-2018-8789: Fix several denial of service vulnerabilities in the in the NTLM Authentication module (bsc#1117965)
- CVE-2018-8785: Fix a potential remote code execution vulnerability in the zgfx_decompress function (bsc#1117967)
- CVE-2018-8786: Fix a potential remote code execution vulnerability in the update_read_bitmap_update function (bsc#1117966)
- CVE-2018-8787: Fix a potential remote code execution vulnerability in the gdi_Bitmap_Decompress function (bsc#1117964)
- CVE-2018-8788: Fix a potential remote code execution vulnerability in the nsc_rle_decode function (bsc#1117963)
- CVE-2018-8784: Fix a potential remote code execution vulnerability in the zgfx_decompress_segment function (bsc#1116708)
- CVE-2018-1000852: Fixed a remote memory access in the drdynvc_process_capability_request function (bsc#1120507)
Other issues:
- Upgraded to version 2.0.0-rc4 (FATE#326739)
- Security and stability improvements, including bsc#1103557 and bsc#1112028
- gateway: multiple fixes and improvements
- client/X11: support for rail (remote app) icons was added
- The licensing code was re-worked: Per-device licenses are now saved on the
client and used on re-connect:
WARNING: this is a change in FreeRDP behavior regarding licensing. If the old
behavior is required, or no licenses should be saved use the
new command line option +old-license (gh#/FreeRDP/FreeRDP#4979)
- Improved order handling - only orders that were enable during capability exchange are accepted.
WARNING and NOTE: some servers do improperly send orders that weren't negotiated,
for such cases the new command line option /relax-order-checks was added to
disable the strict order checking. If connecting to xrdp the options
/relax-order-checks *and* +glyph-cache are required. (gh#/FreeRDP/FreeRDP#4926)
- Fixed automount issues
- Fixed several audio and microphone related issues
- Fixed X11 Right-Ctrl ungrab feature
- Fixed race condition in rdpsnd channel server.
- Disabled SSE2 for ARM and powerpc
Patchnames
SUSE-2019-539,SUSE-SLE-Module-Development-Tools-OBS-15-2019-539,SUSE-SLE-Product-WE-15-2019-539
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for freerdp", title: "Title of the patch", }, { category: "description", text: "This update for freerdp to version 2.0.0~rc4 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2018-0886: Fix a remote code execution vulnerability (CredSSP) (bsc#1085416, bsc#1087240, bsc#1104918)\n- CVE-2018-8789: Fix several denial of service vulnerabilities in the in the NTLM Authentication module (bsc#1117965)\n- CVE-2018-8785: Fix a potential remote code execution vulnerability in the zgfx_decompress function (bsc#1117967)\n- CVE-2018-8786: Fix a potential remote code execution vulnerability in the update_read_bitmap_update function (bsc#1117966)\n- CVE-2018-8787: Fix a potential remote code execution vulnerability in the gdi_Bitmap_Decompress function (bsc#1117964)\n- CVE-2018-8788: Fix a potential remote code execution vulnerability in the nsc_rle_decode function (bsc#1117963)\n- CVE-2018-8784: Fix a potential remote code execution vulnerability in the zgfx_decompress_segment function (bsc#1116708)\n- CVE-2018-1000852: Fixed a remote memory access in the drdynvc_process_capability_request function (bsc#1120507)\n\nOther issues:\n\n- Upgraded to version 2.0.0-rc4 (FATE#326739)\n- Security and stability improvements, including bsc#1103557 and bsc#1112028\n- gateway: multiple fixes and improvements\n- client/X11: support for rail (remote app) icons was added\n- The licensing code was re-worked: Per-device licenses are now saved on the\n client and used on re-connect: \n WARNING: this is a change in FreeRDP behavior regarding licensing. If the old\n behavior is required, or no licenses should be saved use the\n new command line option +old-license (gh#/FreeRDP/FreeRDP#4979)\n- Improved order handling - only orders that were enable during capability exchange are accepted.\n WARNING and NOTE: some servers do improperly send orders that weren't negotiated,\n for such cases the new command line option /relax-order-checks was added to\n disable the strict order checking. If connecting to xrdp the options\n /relax-order-checks *and* +glyph-cache are required. (gh#/FreeRDP/FreeRDP#4926)\n- Fixed automount issues\n- Fixed several audio and microphone related issues\n- Fixed X11 Right-Ctrl ungrab feature\n- Fixed race condition in rdpsnd channel server.\n- Disabled SSE2 for ARM and powerpc\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-539,SUSE-SLE-Module-Development-Tools-OBS-15-2019-539,SUSE-SLE-Product-WE-15-2019-539", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0539-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:0539-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20190539-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:0539-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-March/005170.html", }, { category: "self", summary: "SUSE Bug 1085416", url: "https://bugzilla.suse.com/1085416", }, { category: "self", summary: "SUSE Bug 1087240", url: "https://bugzilla.suse.com/1087240", }, { category: "self", summary: "SUSE Bug 1103557", url: "https://bugzilla.suse.com/1103557", }, { category: "self", summary: "SUSE Bug 1104918", url: "https://bugzilla.suse.com/1104918", }, { category: "self", summary: "SUSE Bug 1112028", url: "https://bugzilla.suse.com/1112028", }, { category: "self", summary: "SUSE Bug 1116708", url: "https://bugzilla.suse.com/1116708", }, { category: "self", summary: "SUSE Bug 1117963", url: "https://bugzilla.suse.com/1117963", }, { category: "self", summary: "SUSE Bug 1117964", url: "https://bugzilla.suse.com/1117964", }, { category: "self", summary: "SUSE Bug 1117965", url: "https://bugzilla.suse.com/1117965", }, { category: "self", summary: "SUSE Bug 1117966", url: "https://bugzilla.suse.com/1117966", }, { category: "self", summary: "SUSE Bug 1117967", url: "https://bugzilla.suse.com/1117967", }, { category: "self", summary: "SUSE Bug 1120507", url: "https://bugzilla.suse.com/1120507", }, { category: "self", summary: "SUSE CVE CVE-2018-0886 page", url: "https://www.suse.com/security/cve/CVE-2018-0886/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000852 page", url: "https://www.suse.com/security/cve/CVE-2018-1000852/", }, { category: "self", summary: "SUSE CVE CVE-2018-8784 page", url: "https://www.suse.com/security/cve/CVE-2018-8784/", }, { category: "self", summary: "SUSE CVE CVE-2018-8785 page", url: "https://www.suse.com/security/cve/CVE-2018-8785/", }, { category: "self", summary: "SUSE CVE CVE-2018-8786 page", url: "https://www.suse.com/security/cve/CVE-2018-8786/", }, { category: "self", summary: "SUSE CVE CVE-2018-8787 page", url: "https://www.suse.com/security/cve/CVE-2018-8787/", }, { category: "self", summary: "SUSE CVE CVE-2018-8788 page", url: "https://www.suse.com/security/cve/CVE-2018-8788/", }, { category: "self", summary: "SUSE CVE CVE-2018-8789 page", url: "https://www.suse.com/security/cve/CVE-2018-8789/", }, ], title: "Security update for freerdp", tracking: { current_release_date: "2019-03-04T16:42:27Z", generator: { date: "2019-03-04T16:42:27Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:0539-1", initial_release_date: "2019-03-04T16:42:27Z", revision_history: [ { date: "2019-03-04T16:42:27Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "freerdp-2.0.0~rc4-3.3.1.aarch64", product: { name: "freerdp-2.0.0~rc4-3.3.1.aarch64", product_id: "freerdp-2.0.0~rc4-3.3.1.aarch64", }, }, { category: "product_version", name: "freerdp-devel-2.0.0~rc4-3.3.1.aarch64", product: { name: "freerdp-devel-2.0.0~rc4-3.3.1.aarch64", product_id: "freerdp-devel-2.0.0~rc4-3.3.1.aarch64", }, }, { category: "product_version", name: "freerdp-server-2.0.0~rc4-3.3.1.aarch64", product: { name: "freerdp-server-2.0.0~rc4-3.3.1.aarch64", product_id: "freerdp-server-2.0.0~rc4-3.3.1.aarch64", }, }, { category: "product_version", name: "freerdp-wayland-2.0.0~rc4-3.3.1.aarch64", product: { name: "freerdp-wayland-2.0.0~rc4-3.3.1.aarch64", product_id: "freerdp-wayland-2.0.0~rc4-3.3.1.aarch64", }, }, { category: "product_version", name: "libfreerdp2-2.0.0~rc4-3.3.1.aarch64", product: { name: "libfreerdp2-2.0.0~rc4-3.3.1.aarch64", product_id: "libfreerdp2-2.0.0~rc4-3.3.1.aarch64", }, }, { category: "product_version", name: "libuwac0-0-2.0.0~rc4-3.3.1.aarch64", product: { name: "libuwac0-0-2.0.0~rc4-3.3.1.aarch64", product_id: "libuwac0-0-2.0.0~rc4-3.3.1.aarch64", }, }, { category: "product_version", name: "libwinpr2-2.0.0~rc4-3.3.1.aarch64", product: { name: "libwinpr2-2.0.0~rc4-3.3.1.aarch64", product_id: "libwinpr2-2.0.0~rc4-3.3.1.aarch64", }, }, { category: "product_version", name: "uwac0-0-devel-2.0.0~rc4-3.3.1.aarch64", product: { name: "uwac0-0-devel-2.0.0~rc4-3.3.1.aarch64", product_id: "uwac0-0-devel-2.0.0~rc4-3.3.1.aarch64", }, }, { category: "product_version", name: "winpr2-devel-2.0.0~rc4-3.3.1.aarch64", product: { name: "winpr2-devel-2.0.0~rc4-3.3.1.aarch64", product_id: "winpr2-devel-2.0.0~rc4-3.3.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "freerdp-2.0.0~rc4-3.3.1.i586", product: { name: "freerdp-2.0.0~rc4-3.3.1.i586", product_id: "freerdp-2.0.0~rc4-3.3.1.i586", }, }, { category: "product_version", name: "freerdp-devel-2.0.0~rc4-3.3.1.i586", product: { name: "freerdp-devel-2.0.0~rc4-3.3.1.i586", product_id: "freerdp-devel-2.0.0~rc4-3.3.1.i586", }, }, { category: "product_version", name: "freerdp-server-2.0.0~rc4-3.3.1.i586", product: { name: "freerdp-server-2.0.0~rc4-3.3.1.i586", product_id: "freerdp-server-2.0.0~rc4-3.3.1.i586", }, }, { category: "product_version", name: "freerdp-wayland-2.0.0~rc4-3.3.1.i586", product: { name: "freerdp-wayland-2.0.0~rc4-3.3.1.i586", product_id: "freerdp-wayland-2.0.0~rc4-3.3.1.i586", }, }, { category: "product_version", name: "libfreerdp2-2.0.0~rc4-3.3.1.i586", product: { name: "libfreerdp2-2.0.0~rc4-3.3.1.i586", product_id: "libfreerdp2-2.0.0~rc4-3.3.1.i586", }, }, { category: "product_version", name: "libuwac0-0-2.0.0~rc4-3.3.1.i586", product: { name: "libuwac0-0-2.0.0~rc4-3.3.1.i586", product_id: "libuwac0-0-2.0.0~rc4-3.3.1.i586", }, }, { category: "product_version", name: "libwinpr2-2.0.0~rc4-3.3.1.i586", product: { name: "libwinpr2-2.0.0~rc4-3.3.1.i586", product_id: "libwinpr2-2.0.0~rc4-3.3.1.i586", }, }, { category: "product_version", name: "uwac0-0-devel-2.0.0~rc4-3.3.1.i586", product: { name: "uwac0-0-devel-2.0.0~rc4-3.3.1.i586", product_id: "uwac0-0-devel-2.0.0~rc4-3.3.1.i586", }, }, { category: "product_version", name: "winpr2-devel-2.0.0~rc4-3.3.1.i586", product: { name: "winpr2-devel-2.0.0~rc4-3.3.1.i586", product_id: "winpr2-devel-2.0.0~rc4-3.3.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "freerdp-2.0.0~rc4-3.3.1.ppc64le", product: { name: "freerdp-2.0.0~rc4-3.3.1.ppc64le", product_id: "freerdp-2.0.0~rc4-3.3.1.ppc64le", }, }, { category: "product_version", name: "freerdp-devel-2.0.0~rc4-3.3.1.ppc64le", product: { name: "freerdp-devel-2.0.0~rc4-3.3.1.ppc64le", product_id: "freerdp-devel-2.0.0~rc4-3.3.1.ppc64le", }, }, { category: "product_version", name: "freerdp-server-2.0.0~rc4-3.3.1.ppc64le", product: { name: "freerdp-server-2.0.0~rc4-3.3.1.ppc64le", product_id: "freerdp-server-2.0.0~rc4-3.3.1.ppc64le", }, }, { category: "product_version", name: "freerdp-wayland-2.0.0~rc4-3.3.1.ppc64le", product: { name: "freerdp-wayland-2.0.0~rc4-3.3.1.ppc64le", product_id: "freerdp-wayland-2.0.0~rc4-3.3.1.ppc64le", }, }, { category: "product_version", name: "libfreerdp2-2.0.0~rc4-3.3.1.ppc64le", product: { name: "libfreerdp2-2.0.0~rc4-3.3.1.ppc64le", product_id: "libfreerdp2-2.0.0~rc4-3.3.1.ppc64le", }, }, { category: "product_version", name: "libuwac0-0-2.0.0~rc4-3.3.1.ppc64le", product: { name: "libuwac0-0-2.0.0~rc4-3.3.1.ppc64le", product_id: "libuwac0-0-2.0.0~rc4-3.3.1.ppc64le", }, }, { category: "product_version", name: "libwinpr2-2.0.0~rc4-3.3.1.ppc64le", product: { name: "libwinpr2-2.0.0~rc4-3.3.1.ppc64le", product_id: "libwinpr2-2.0.0~rc4-3.3.1.ppc64le", }, }, { category: "product_version", name: "uwac0-0-devel-2.0.0~rc4-3.3.1.ppc64le", product: { name: "uwac0-0-devel-2.0.0~rc4-3.3.1.ppc64le", product_id: "uwac0-0-devel-2.0.0~rc4-3.3.1.ppc64le", }, }, { category: "product_version", name: "winpr2-devel-2.0.0~rc4-3.3.1.ppc64le", product: { name: "winpr2-devel-2.0.0~rc4-3.3.1.ppc64le", product_id: "winpr2-devel-2.0.0~rc4-3.3.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "freerdp-2.0.0~rc4-3.3.1.s390x", product: { name: "freerdp-2.0.0~rc4-3.3.1.s390x", product_id: "freerdp-2.0.0~rc4-3.3.1.s390x", }, }, { category: "product_version", name: "freerdp-devel-2.0.0~rc4-3.3.1.s390x", product: { name: "freerdp-devel-2.0.0~rc4-3.3.1.s390x", product_id: "freerdp-devel-2.0.0~rc4-3.3.1.s390x", }, }, { category: "product_version", name: "freerdp-server-2.0.0~rc4-3.3.1.s390x", product: { name: "freerdp-server-2.0.0~rc4-3.3.1.s390x", product_id: "freerdp-server-2.0.0~rc4-3.3.1.s390x", }, }, { category: "product_version", name: "freerdp-wayland-2.0.0~rc4-3.3.1.s390x", product: { name: "freerdp-wayland-2.0.0~rc4-3.3.1.s390x", product_id: "freerdp-wayland-2.0.0~rc4-3.3.1.s390x", }, }, { category: "product_version", name: "libfreerdp2-2.0.0~rc4-3.3.1.s390x", product: { name: "libfreerdp2-2.0.0~rc4-3.3.1.s390x", product_id: "libfreerdp2-2.0.0~rc4-3.3.1.s390x", }, }, { category: "product_version", name: "libuwac0-0-2.0.0~rc4-3.3.1.s390x", product: { name: "libuwac0-0-2.0.0~rc4-3.3.1.s390x", product_id: "libuwac0-0-2.0.0~rc4-3.3.1.s390x", }, }, { category: "product_version", name: "libwinpr2-2.0.0~rc4-3.3.1.s390x", product: { name: "libwinpr2-2.0.0~rc4-3.3.1.s390x", product_id: "libwinpr2-2.0.0~rc4-3.3.1.s390x", }, }, { category: "product_version", name: "uwac0-0-devel-2.0.0~rc4-3.3.1.s390x", product: { name: "uwac0-0-devel-2.0.0~rc4-3.3.1.s390x", product_id: "uwac0-0-devel-2.0.0~rc4-3.3.1.s390x", }, }, { category: "product_version", name: "winpr2-devel-2.0.0~rc4-3.3.1.s390x", product: { name: "winpr2-devel-2.0.0~rc4-3.3.1.s390x", product_id: "winpr2-devel-2.0.0~rc4-3.3.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "freerdp-2.0.0~rc4-3.3.1.x86_64", product: { name: "freerdp-2.0.0~rc4-3.3.1.x86_64", product_id: "freerdp-2.0.0~rc4-3.3.1.x86_64", }, }, { category: "product_version", name: "freerdp-devel-2.0.0~rc4-3.3.1.x86_64", product: { name: "freerdp-devel-2.0.0~rc4-3.3.1.x86_64", product_id: "freerdp-devel-2.0.0~rc4-3.3.1.x86_64", }, }, { category: "product_version", name: "freerdp-server-2.0.0~rc4-3.3.1.x86_64", product: { name: "freerdp-server-2.0.0~rc4-3.3.1.x86_64", product_id: "freerdp-server-2.0.0~rc4-3.3.1.x86_64", }, }, { category: "product_version", name: "freerdp-wayland-2.0.0~rc4-3.3.1.x86_64", product: { name: "freerdp-wayland-2.0.0~rc4-3.3.1.x86_64", product_id: "freerdp-wayland-2.0.0~rc4-3.3.1.x86_64", }, }, { category: "product_version", name: "libfreerdp2-2.0.0~rc4-3.3.1.x86_64", product: { name: "libfreerdp2-2.0.0~rc4-3.3.1.x86_64", product_id: "libfreerdp2-2.0.0~rc4-3.3.1.x86_64", }, }, { category: "product_version", name: "libuwac0-0-2.0.0~rc4-3.3.1.x86_64", product: { name: "libuwac0-0-2.0.0~rc4-3.3.1.x86_64", product_id: "libuwac0-0-2.0.0~rc4-3.3.1.x86_64", }, }, { category: "product_version", name: "libwinpr2-2.0.0~rc4-3.3.1.x86_64", product: { name: "libwinpr2-2.0.0~rc4-3.3.1.x86_64", product_id: "libwinpr2-2.0.0~rc4-3.3.1.x86_64", }, }, { category: "product_version", name: "uwac0-0-devel-2.0.0~rc4-3.3.1.x86_64", product: { name: "uwac0-0-devel-2.0.0~rc4-3.3.1.x86_64", product_id: "uwac0-0-devel-2.0.0~rc4-3.3.1.x86_64", }, }, { category: "product_version", name: "winpr2-devel-2.0.0~rc4-3.3.1.x86_64", product: { name: "winpr2-devel-2.0.0~rc4-3.3.1.x86_64", product_id: "winpr2-devel-2.0.0~rc4-3.3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 15", product: { name: "SUSE Linux Enterprise Workstation Extension 15", product_id: "SUSE Linux Enterprise Workstation Extension 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:15", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "freerdp-2.0.0~rc4-3.3.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15", product_id: "SUSE Linux Enterprise Workstation Extension 15:freerdp-2.0.0~rc4-3.3.1.x86_64", }, product_reference: "freerdp-2.0.0~rc4-3.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 15", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-2.0.0~rc4-3.3.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15", product_id: "SUSE Linux Enterprise Workstation Extension 15:freerdp-devel-2.0.0~rc4-3.3.1.x86_64", }, product_reference: "freerdp-devel-2.0.0~rc4-3.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 15", }, { category: "default_component_of", full_product_name: { name: "libfreerdp2-2.0.0~rc4-3.3.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15", product_id: "SUSE Linux Enterprise Workstation Extension 15:libfreerdp2-2.0.0~rc4-3.3.1.x86_64", }, product_reference: "libfreerdp2-2.0.0~rc4-3.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 15", }, { category: "default_component_of", full_product_name: { name: "libwinpr2-2.0.0~rc4-3.3.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15", product_id: "SUSE Linux Enterprise Workstation Extension 15:libwinpr2-2.0.0~rc4-3.3.1.x86_64", }, product_reference: "libwinpr2-2.0.0~rc4-3.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 15", }, { category: "default_component_of", full_product_name: { name: "winpr2-devel-2.0.0~rc4-3.3.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15", product_id: "SUSE Linux Enterprise Workstation Extension 15:winpr2-devel-2.0.0~rc4-3.3.1.x86_64", }, product_reference: "winpr2-devel-2.0.0~rc4-3.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 15", }, ], }, vulnerabilities: [ { cve: "CVE-2018-0886", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-0886", }, ], notes: [ { category: "general", text: "The Credential Security Support Provider protocol (CredSSP) in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709 Windows Server 2016 and Windows Server, version 1709 allows a remote code execution vulnerability due to how CredSSP validates request during the authentication process, aka \"CredSSP Remote Code Execution Vulnerability\".", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Workstation Extension 15:freerdp-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:freerdp-devel-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libfreerdp2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libwinpr2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:winpr2-devel-2.0.0~rc4-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-0886", url: "https://www.suse.com/security/cve/CVE-2018-0886", }, { category: "external", summary: "SUSE Bug 1085416 for CVE-2018-0886", url: "https://bugzilla.suse.com/1085416", }, { category: "external", summary: "SUSE Bug 1087240 for CVE-2018-0886", url: "https://bugzilla.suse.com/1087240", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-0886", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-0886", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Workstation Extension 15:freerdp-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:freerdp-devel-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libfreerdp2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libwinpr2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:winpr2-devel-2.0.0~rc4-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Workstation Extension 15:freerdp-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:freerdp-devel-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libfreerdp2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libwinpr2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:winpr2-devel-2.0.0~rc4-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-03-04T16:42:27Z", details: "important", }, ], title: "CVE-2018-0886", }, { cve: "CVE-2018-1000852", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000852", }, ], notes: [ { category: "general", text: "FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via RDPClient must connect the rdp server with echo option. This vulnerability appears to have been fixed in after commit 205c612820dac644d665b5bb1cdf437dc5ca01e3.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Workstation Extension 15:freerdp-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:freerdp-devel-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libfreerdp2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libwinpr2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:winpr2-devel-2.0.0~rc4-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000852", url: "https://www.suse.com/security/cve/CVE-2018-1000852", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-1000852", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1120507 for CVE-2018-1000852", url: "https://bugzilla.suse.com/1120507", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-1000852", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Workstation Extension 15:freerdp-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:freerdp-devel-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libfreerdp2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libwinpr2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:winpr2-devel-2.0.0~rc4-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Workstation Extension 15:freerdp-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:freerdp-devel-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libfreerdp2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libwinpr2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:winpr2-devel-2.0.0~rc4-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-03-04T16:42:27Z", details: "moderate", }, ], title: "CVE-2018-1000852", }, { cve: "CVE-2018-8784", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8784", }, ], notes: [ { category: "general", text: "FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress_segment() that results in a memory corruption and probably even a remote code execution.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Workstation Extension 15:freerdp-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:freerdp-devel-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libfreerdp2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libwinpr2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:winpr2-devel-2.0.0~rc4-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8784", url: "https://www.suse.com/security/cve/CVE-2018-8784", }, { category: "external", summary: "SUSE Bug 1116708 for CVE-2018-8784", url: "https://bugzilla.suse.com/1116708", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-8784", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-8784", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Workstation Extension 15:freerdp-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:freerdp-devel-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libfreerdp2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libwinpr2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:winpr2-devel-2.0.0~rc4-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Workstation Extension 15:freerdp-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:freerdp-devel-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libfreerdp2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libwinpr2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:winpr2-devel-2.0.0~rc4-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-03-04T16:42:27Z", details: "important", }, ], title: "CVE-2018-8784", }, { cve: "CVE-2018-8785", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8785", }, ], notes: [ { category: "general", text: "FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress() that results in a memory corruption and probably even a remote code execution.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Workstation Extension 15:freerdp-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:freerdp-devel-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libfreerdp2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libwinpr2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:winpr2-devel-2.0.0~rc4-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8785", url: "https://www.suse.com/security/cve/CVE-2018-8785", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-8785", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1117967 for CVE-2018-8785", url: "https://bugzilla.suse.com/1117967", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-8785", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Workstation Extension 15:freerdp-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:freerdp-devel-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libfreerdp2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libwinpr2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:winpr2-devel-2.0.0~rc4-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Workstation Extension 15:freerdp-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:freerdp-devel-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libfreerdp2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libwinpr2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:winpr2-devel-2.0.0~rc4-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-03-04T16:42:27Z", details: "important", }, ], title: "CVE-2018-8785", }, { cve: "CVE-2018-8786", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8786", }, ], notes: [ { category: "general", text: "FreeRDP prior to version 2.0.0-rc4 contains an Integer Truncation that leads to a Heap-Based Buffer Overflow in function update_read_bitmap_update() and results in a memory corruption and probably even a remote code execution.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Workstation Extension 15:freerdp-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:freerdp-devel-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libfreerdp2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libwinpr2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:winpr2-devel-2.0.0~rc4-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8786", url: "https://www.suse.com/security/cve/CVE-2018-8786", }, { category: "external", summary: "SUSE Bug 1116708 for CVE-2018-8786", url: "https://bugzilla.suse.com/1116708", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-8786", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1117966 for CVE-2018-8786", url: "https://bugzilla.suse.com/1117966", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-8786", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Workstation Extension 15:freerdp-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:freerdp-devel-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libfreerdp2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libwinpr2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:winpr2-devel-2.0.0~rc4-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Workstation Extension 15:freerdp-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:freerdp-devel-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libfreerdp2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libwinpr2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:winpr2-devel-2.0.0~rc4-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-03-04T16:42:27Z", details: "important", }, ], title: "CVE-2018-8786", }, { cve: "CVE-2018-8787", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8787", }, ], notes: [ { category: "general", text: "FreeRDP prior to version 2.0.0-rc4 contains an Integer Overflow that leads to a Heap-Based Buffer Overflow in function gdi_Bitmap_Decompress() and results in a memory corruption and probably even a remote code execution.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Workstation Extension 15:freerdp-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:freerdp-devel-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libfreerdp2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libwinpr2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:winpr2-devel-2.0.0~rc4-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8787", url: "https://www.suse.com/security/cve/CVE-2018-8787", }, { category: "external", summary: "SUSE Bug 1116708 for CVE-2018-8787", url: "https://bugzilla.suse.com/1116708", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-8787", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1117964 for CVE-2018-8787", url: "https://bugzilla.suse.com/1117964", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-8787", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Workstation Extension 15:freerdp-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:freerdp-devel-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libfreerdp2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libwinpr2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:winpr2-devel-2.0.0~rc4-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Workstation Extension 15:freerdp-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:freerdp-devel-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libfreerdp2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libwinpr2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:winpr2-devel-2.0.0~rc4-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-03-04T16:42:27Z", details: "important", }, ], title: "CVE-2018-8787", }, { cve: "CVE-2018-8788", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8788", }, ], notes: [ { category: "general", text: "FreeRDP prior to version 2.0.0-rc4 contains an Out-Of-Bounds Write of up to 4 bytes in function nsc_rle_decode() that results in a memory corruption and possibly even a remote code execution.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Workstation Extension 15:freerdp-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:freerdp-devel-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libfreerdp2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libwinpr2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:winpr2-devel-2.0.0~rc4-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8788", url: "https://www.suse.com/security/cve/CVE-2018-8788", }, { category: "external", summary: "SUSE Bug 1116708 for CVE-2018-8788", url: "https://bugzilla.suse.com/1116708", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-8788", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-8788", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Workstation Extension 15:freerdp-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:freerdp-devel-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libfreerdp2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libwinpr2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:winpr2-devel-2.0.0~rc4-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Workstation Extension 15:freerdp-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:freerdp-devel-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libfreerdp2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libwinpr2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:winpr2-devel-2.0.0~rc4-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-03-04T16:42:27Z", details: "important", }, ], title: "CVE-2018-8788", }, { cve: "CVE-2018-8789", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8789", }, ], notes: [ { category: "general", text: "FreeRDP prior to version 2.0.0-rc4 contains several Out-Of-Bounds Reads in the NTLM Authentication module that results in a Denial of Service (segfault).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Workstation Extension 15:freerdp-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:freerdp-devel-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libfreerdp2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libwinpr2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:winpr2-devel-2.0.0~rc4-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8789", url: "https://www.suse.com/security/cve/CVE-2018-8789", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-8789", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1117965 for CVE-2018-8789", url: "https://bugzilla.suse.com/1117965", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-8789", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Workstation Extension 15:freerdp-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:freerdp-devel-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libfreerdp2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libwinpr2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:winpr2-devel-2.0.0~rc4-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Workstation Extension 15:freerdp-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:freerdp-devel-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libfreerdp2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:libwinpr2-2.0.0~rc4-3.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:winpr2-devel-2.0.0~rc4-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-03-04T16:42:27Z", details: "moderate", }, ], title: "CVE-2018-8789", }, ], }
suse-su-2020:2272-1
Vulnerability from csaf_suse
Published
2020-08-18 14:44
Modified
2020-08-18 14:44
Summary
Security update for freerdp
Notes
Title of the patch
Security update for freerdp
Description of the patch
This update for freerdp fixes the following issues:
freerdp was updated to version 2.1.2 (bsc#1171441,bsc#1173247 and jsc#ECO-2006):
- CVE-2020-11017: Fixed a double free which could have denied the server's service.
- CVE-2020-11018: Fixed an out of bounds read which a malicious clients could have triggered.
- CVE-2020-11019: Fixed an issue which could have led to denial of service if logger was set to 'WLOG_TRACE'.
- CVE-2020-11038: Fixed a buffer overflow when /video redirection was used.
- CVE-2020-11039: Fixed an issue which could have allowed arbitrary memory read and write when USB redirection was enabled.
- CVE-2020-11040: Fixed an out of bounds data read in clear_decompress_subcode_rlex.
- CVE-2020-11041: Fixed an issue with the configuration for sound backend which could have led to server's denial of service.
- CVE-2020-11043: Fixed an out of bounds read in rfx_process_message_tileset.
- CVE-2020-11085: Fixed an out of bounds read in cliprdr_read_format_list.
- CVE-2020-11086: Fixed an out of bounds read in ntlm_read_ntlm_v2_client_challenge.
- CVE-2020-11087: Fixed an out of bounds read in ntlm_read_AuthenticateMessage.
- CVE-2020-11088: Fixed an out of bounds read in ntlm_read_NegotiateMessage.
- CVE-2020-11089: Fixed an out of bounds read in irp function family.
- CVE-2020-11095: Fixed a global out of bounds read in update_recv_primary_order.
- CVE-2020-11096: Fixed a global out of bounds read in update_read_cache_bitmap_v3_order.
- CVE-2020-11097: Fixed an out of bounds read in ntlm_av_pair_get.
- CVE-2020-11098: Fixed an out of bounds read in glyph_cache_put.
- CVE-2020-11099: Fixed an out of bounds Read in license_read_new_or_upgrade_license_packet.
- CVE-2020-11521: Fixed an out of bounds write in planar.c (bsc#1171443).
- CVE-2020-11522: Fixed an out of bounds read in gdi.c (bsc#1171444).
- CVE-2020-11523: Fixed an integer overflow in region.c (bsc#1171445).
- CVE-2020-11524: Fixed an out of bounds write in interleaved.c (bsc#1171446).
- CVE-2020-11525: Fixed an out of bounds read in bitmap.c (bsc#1171447).
- CVE-2020-11526: Fixed an out of bounds read in update_recv_secondary_order (bsc#1171674).
- CVE-2020-13396: Fixed an Read in ntlm_read_ChallengeMessage.
- CVE-2020-13397: Fixed an out of bounds read in security_fips_decrypt due to uninitialized value.
- CVE-2020-13398: Fixed an out of bounds write in crypto_rsa_common.
- CVE-2020-4030: Fixed an out of bounds read in `TrioParse`.
- CVE-2020-4031: Fixed a use after free in gdi_SelectObject.
- CVE-2020-4032: Fixed an integer casting in `update_recv_secondary_order`.
- CVE-2020-4033: Fixed an out of bound read in RLEDECOMPRESS.
- Fixed an issue where freerdp failed with -fno-common (bsc#1169748).
- Fixed an issue where USB redirection with FreeRDP was not working (bsc#1169679).
- Fixed an issue where freerdp could not start (bsc#1129193).
- Fixed an issue where copy and paste between remote host was transforming text to chinese (bsc#1004108).
- Added pulse support (bsc#1090677).
Additionally, the following issue was fixed:
- CVE-2020-15103: Fix integer overflow due to missing input sanitation in rdpegfx channel (bsc#1174321).
Patchnames
SUSE-2020-2272,SUSE-SLE-SDK-12-SP5-2020-2272,SUSE-SLE-WE-12-SP5-2020-2272
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for freerdp", title: "Title of the patch", }, { category: "description", text: "This update for freerdp fixes the following issues:\n\nfreerdp was updated to version 2.1.2 (bsc#1171441,bsc#1173247 and jsc#ECO-2006):\n\n- CVE-2020-11017: Fixed a double free which could have denied the server's service.\n- CVE-2020-11018: Fixed an out of bounds read which a malicious clients could have triggered.\n- CVE-2020-11019: Fixed an issue which could have led to denial of service if logger was set to 'WLOG_TRACE'.\n- CVE-2020-11038: Fixed a buffer overflow when /video redirection was used.\n- CVE-2020-11039: Fixed an issue which could have allowed arbitrary memory read and write when USB redirection was enabled.\n- CVE-2020-11040: Fixed an out of bounds data read in clear_decompress_subcode_rlex.\n- CVE-2020-11041: Fixed an issue with the configuration for sound backend which could have led to server's denial of service.\n- CVE-2020-11043: Fixed an out of bounds read in rfx_process_message_tileset.\n- CVE-2020-11085: Fixed an out of bounds read in cliprdr_read_format_list.\n- CVE-2020-11086: Fixed an out of bounds read in ntlm_read_ntlm_v2_client_challenge.\n- CVE-2020-11087: Fixed an out of bounds read in ntlm_read_AuthenticateMessage.\n- CVE-2020-11088: Fixed an out of bounds read in ntlm_read_NegotiateMessage.\n- CVE-2020-11089: Fixed an out of bounds read in irp function family.\n- CVE-2020-11095: Fixed a global out of bounds read in update_recv_primary_order.\n- CVE-2020-11096: Fixed a global out of bounds read in update_read_cache_bitmap_v3_order.\n- CVE-2020-11097: Fixed an out of bounds read in ntlm_av_pair_get.\n- CVE-2020-11098: Fixed an out of bounds read in glyph_cache_put.\n- CVE-2020-11099: Fixed an out of bounds Read in license_read_new_or_upgrade_license_packet.\n- CVE-2020-11521: Fixed an out of bounds write in planar.c (bsc#1171443).\n- CVE-2020-11522: Fixed an out of bounds read in gdi.c (bsc#1171444).\n- CVE-2020-11523: Fixed an integer overflow in region.c (bsc#1171445).\n- CVE-2020-11524: Fixed an out of bounds write in interleaved.c (bsc#1171446).\n- CVE-2020-11525: Fixed an out of bounds read in bitmap.c (bsc#1171447).\n- CVE-2020-11526: Fixed an out of bounds read in update_recv_secondary_order (bsc#1171674).\n- CVE-2020-13396: Fixed an Read in ntlm_read_ChallengeMessage.\n- CVE-2020-13397: Fixed an out of bounds read in security_fips_decrypt due to uninitialized value.\n- CVE-2020-13398: Fixed an out of bounds write in crypto_rsa_common.\n- CVE-2020-4030: Fixed an out of bounds read in `TrioParse`.\n- CVE-2020-4031: Fixed a use after free in gdi_SelectObject.\n- CVE-2020-4032: Fixed an integer casting in `update_recv_secondary_order`.\n- CVE-2020-4033: Fixed an out of bound read in RLEDECOMPRESS.\n- Fixed an issue where freerdp failed with -fno-common (bsc#1169748).\n- Fixed an issue where USB redirection with FreeRDP was not working (bsc#1169679).\n- Fixed an issue where freerdp could not start (bsc#1129193).\n- Fixed an issue where copy and paste between remote host was transforming text to chinese (bsc#1004108).\n- Added pulse support (bsc#1090677).\n\nAdditionally, the following issue was fixed:\n\n- CVE-2020-15103: Fix integer overflow due to missing input sanitation in rdpegfx channel (bsc#1174321).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2020-2272,SUSE-SLE-SDK-12-SP5-2020-2272,SUSE-SLE-WE-12-SP5-2020-2272", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2272-1.json", }, { category: "self", summary: "URL for SUSE-SU-2020:2272-1", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20202272-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2020:2272-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2020-August/007279.html", }, { category: "self", summary: "SUSE Bug 1004108", url: "https://bugzilla.suse.com/1004108", }, { category: "self", summary: "SUSE Bug 1050699", url: "https://bugzilla.suse.com/1050699", }, { category: "self", summary: "SUSE Bug 1050704", url: "https://bugzilla.suse.com/1050704", }, { category: "self", summary: "SUSE Bug 1050708", url: "https://bugzilla.suse.com/1050708", }, { category: "self", summary: "SUSE Bug 1050711", url: "https://bugzilla.suse.com/1050711", }, { category: "self", summary: "SUSE Bug 1050712", url: "https://bugzilla.suse.com/1050712", }, { category: "self", summary: "SUSE Bug 1050714", url: "https://bugzilla.suse.com/1050714", }, { category: "self", summary: "SUSE Bug 1085416", url: "https://bugzilla.suse.com/1085416", }, { category: "self", summary: "SUSE Bug 1087240", url: "https://bugzilla.suse.com/1087240", }, { category: "self", summary: "SUSE Bug 1090677", url: "https://bugzilla.suse.com/1090677", }, { category: "self", summary: "SUSE Bug 1103557", url: "https://bugzilla.suse.com/1103557", }, { category: "self", summary: "SUSE Bug 1104918", url: "https://bugzilla.suse.com/1104918", }, { category: "self", summary: "SUSE Bug 1112028", url: "https://bugzilla.suse.com/1112028", }, { category: "self", summary: "SUSE Bug 1116708", url: "https://bugzilla.suse.com/1116708", }, { category: "self", summary: "SUSE Bug 1117963", url: "https://bugzilla.suse.com/1117963", }, { category: "self", summary: "SUSE Bug 1117964", url: "https://bugzilla.suse.com/1117964", }, { category: "self", summary: "SUSE Bug 1117965", url: "https://bugzilla.suse.com/1117965", }, { category: "self", summary: "SUSE Bug 1117966", url: "https://bugzilla.suse.com/1117966", }, { category: "self", summary: "SUSE Bug 1117967", url: "https://bugzilla.suse.com/1117967", }, { category: "self", summary: "SUSE Bug 1120507", url: "https://bugzilla.suse.com/1120507", }, { category: "self", summary: "SUSE Bug 1129193", url: "https://bugzilla.suse.com/1129193", }, { category: "self", summary: "SUSE Bug 1169679", url: "https://bugzilla.suse.com/1169679", }, { category: "self", summary: "SUSE Bug 1169748", url: "https://bugzilla.suse.com/1169748", }, { category: "self", summary: "SUSE Bug 1171441", url: "https://bugzilla.suse.com/1171441", }, { category: "self", summary: "SUSE Bug 1171443", url: "https://bugzilla.suse.com/1171443", }, { category: "self", summary: "SUSE Bug 1171444", url: "https://bugzilla.suse.com/1171444", }, { category: "self", summary: "SUSE Bug 1171445", url: "https://bugzilla.suse.com/1171445", }, { category: "self", summary: "SUSE Bug 1171446", url: "https://bugzilla.suse.com/1171446", }, { category: "self", summary: "SUSE Bug 1171447", url: "https://bugzilla.suse.com/1171447", }, { category: "self", summary: "SUSE Bug 1171674", url: "https://bugzilla.suse.com/1171674", }, { category: "self", summary: "SUSE Bug 1173247", url: "https://bugzilla.suse.com/1173247", }, { category: "self", summary: "SUSE Bug 1173605", url: "https://bugzilla.suse.com/1173605", }, { category: "self", summary: "SUSE Bug 1174200", url: "https://bugzilla.suse.com/1174200", }, { category: "self", summary: "SUSE Bug 1174321", url: "https://bugzilla.suse.com/1174321", }, { category: "self", summary: "SUSE CVE CVE-2017-2834 page", url: "https://www.suse.com/security/cve/CVE-2017-2834/", }, { category: "self", summary: "SUSE CVE CVE-2017-2835 page", url: "https://www.suse.com/security/cve/CVE-2017-2835/", }, { category: "self", summary: "SUSE CVE CVE-2017-2836 page", url: "https://www.suse.com/security/cve/CVE-2017-2836/", }, { category: "self", summary: "SUSE CVE CVE-2017-2837 page", url: "https://www.suse.com/security/cve/CVE-2017-2837/", }, { category: "self", summary: "SUSE CVE CVE-2017-2838 page", url: "https://www.suse.com/security/cve/CVE-2017-2838/", }, { category: "self", summary: "SUSE CVE CVE-2017-2839 page", url: "https://www.suse.com/security/cve/CVE-2017-2839/", }, { category: "self", summary: "SUSE CVE CVE-2018-0886 page", url: "https://www.suse.com/security/cve/CVE-2018-0886/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000852 page", url: "https://www.suse.com/security/cve/CVE-2018-1000852/", }, { category: "self", summary: "SUSE CVE CVE-2018-8784 page", url: "https://www.suse.com/security/cve/CVE-2018-8784/", }, { category: "self", summary: "SUSE CVE CVE-2018-8785 page", url: "https://www.suse.com/security/cve/CVE-2018-8785/", }, { category: "self", summary: "SUSE CVE CVE-2018-8786 page", url: "https://www.suse.com/security/cve/CVE-2018-8786/", }, { category: "self", summary: "SUSE CVE CVE-2018-8787 page", url: "https://www.suse.com/security/cve/CVE-2018-8787/", }, { category: "self", summary: "SUSE CVE CVE-2018-8788 page", url: "https://www.suse.com/security/cve/CVE-2018-8788/", }, { category: "self", summary: "SUSE CVE CVE-2018-8789 page", url: "https://www.suse.com/security/cve/CVE-2018-8789/", }, { category: "self", summary: "SUSE CVE CVE-2020-11017 page", url: "https://www.suse.com/security/cve/CVE-2020-11017/", }, { category: "self", summary: "SUSE CVE CVE-2020-11018 page", url: "https://www.suse.com/security/cve/CVE-2020-11018/", }, { category: "self", summary: "SUSE CVE CVE-2020-11019 page", url: "https://www.suse.com/security/cve/CVE-2020-11019/", }, { category: "self", summary: "SUSE CVE CVE-2020-11038 page", url: "https://www.suse.com/security/cve/CVE-2020-11038/", }, { category: "self", summary: "SUSE CVE CVE-2020-11039 page", url: "https://www.suse.com/security/cve/CVE-2020-11039/", }, { category: "self", summary: "SUSE CVE CVE-2020-11040 page", url: "https://www.suse.com/security/cve/CVE-2020-11040/", }, { category: "self", summary: "SUSE CVE CVE-2020-11041 page", url: "https://www.suse.com/security/cve/CVE-2020-11041/", }, { category: "self", summary: "SUSE CVE CVE-2020-11043 page", url: "https://www.suse.com/security/cve/CVE-2020-11043/", }, { category: "self", summary: "SUSE CVE CVE-2020-11085 page", url: "https://www.suse.com/security/cve/CVE-2020-11085/", }, { category: "self", summary: "SUSE CVE CVE-2020-11086 page", url: "https://www.suse.com/security/cve/CVE-2020-11086/", }, { category: "self", summary: "SUSE CVE CVE-2020-11087 page", url: "https://www.suse.com/security/cve/CVE-2020-11087/", }, { category: "self", summary: "SUSE CVE CVE-2020-11088 page", url: "https://www.suse.com/security/cve/CVE-2020-11088/", }, { category: "self", summary: "SUSE CVE CVE-2020-11089 page", url: "https://www.suse.com/security/cve/CVE-2020-11089/", }, { category: "self", summary: "SUSE CVE CVE-2020-11095 page", url: "https://www.suse.com/security/cve/CVE-2020-11095/", }, { category: "self", summary: "SUSE CVE CVE-2020-11096 page", url: "https://www.suse.com/security/cve/CVE-2020-11096/", }, { category: "self", summary: "SUSE CVE CVE-2020-11097 page", url: "https://www.suse.com/security/cve/CVE-2020-11097/", }, { category: "self", summary: "SUSE CVE CVE-2020-11098 page", url: "https://www.suse.com/security/cve/CVE-2020-11098/", }, { category: "self", summary: "SUSE CVE CVE-2020-11099 page", url: "https://www.suse.com/security/cve/CVE-2020-11099/", }, { category: "self", summary: "SUSE CVE CVE-2020-11521 page", url: "https://www.suse.com/security/cve/CVE-2020-11521/", }, { category: "self", summary: "SUSE CVE CVE-2020-11522 page", url: "https://www.suse.com/security/cve/CVE-2020-11522/", }, { category: "self", summary: "SUSE CVE CVE-2020-11523 page", url: "https://www.suse.com/security/cve/CVE-2020-11523/", }, { category: "self", summary: "SUSE CVE CVE-2020-11524 page", url: "https://www.suse.com/security/cve/CVE-2020-11524/", }, { category: "self", summary: "SUSE CVE CVE-2020-11525 page", url: "https://www.suse.com/security/cve/CVE-2020-11525/", }, { category: "self", summary: "SUSE CVE CVE-2020-11526 page", url: "https://www.suse.com/security/cve/CVE-2020-11526/", }, { category: "self", summary: "SUSE CVE CVE-2020-13396 page", url: "https://www.suse.com/security/cve/CVE-2020-13396/", }, { category: "self", summary: "SUSE CVE CVE-2020-13397 page", url: "https://www.suse.com/security/cve/CVE-2020-13397/", }, { category: "self", summary: "SUSE CVE CVE-2020-13398 page", url: "https://www.suse.com/security/cve/CVE-2020-13398/", }, { category: "self", summary: "SUSE CVE CVE-2020-15103 page", url: "https://www.suse.com/security/cve/CVE-2020-15103/", }, { category: "self", summary: "SUSE CVE CVE-2020-4030 page", url: "https://www.suse.com/security/cve/CVE-2020-4030/", }, { category: "self", summary: "SUSE CVE CVE-2020-4031 page", url: "https://www.suse.com/security/cve/CVE-2020-4031/", }, { category: "self", summary: "SUSE CVE CVE-2020-4032 page", url: "https://www.suse.com/security/cve/CVE-2020-4032/", }, { category: "self", summary: "SUSE CVE CVE-2020-4033 page", url: "https://www.suse.com/security/cve/CVE-2020-4033/", }, ], title: "Security update for freerdp", tracking: { current_release_date: "2020-08-18T14:44:51Z", generator: { date: "2020-08-18T14:44:51Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2020:2272-1", initial_release_date: "2020-08-18T14:44:51Z", revision_history: [ { date: "2020-08-18T14:44:51Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "freerdp-2.1.2-12.20.1.aarch64", product: { name: "freerdp-2.1.2-12.20.1.aarch64", product_id: "freerdp-2.1.2-12.20.1.aarch64", }, }, { category: "product_version", name: "freerdp-devel-2.1.2-12.20.1.aarch64", product: { name: "freerdp-devel-2.1.2-12.20.1.aarch64", product_id: "freerdp-devel-2.1.2-12.20.1.aarch64", }, }, { category: "product_version", name: "freerdp-proxy-2.1.2-12.20.1.aarch64", product: { name: "freerdp-proxy-2.1.2-12.20.1.aarch64", product_id: "freerdp-proxy-2.1.2-12.20.1.aarch64", }, }, { category: "product_version", name: "freerdp-server-2.1.2-12.20.1.aarch64", product: { name: "freerdp-server-2.1.2-12.20.1.aarch64", product_id: "freerdp-server-2.1.2-12.20.1.aarch64", }, }, { category: "product_version", name: "freerdp-wayland-2.1.2-12.20.1.aarch64", product: { name: "freerdp-wayland-2.1.2-12.20.1.aarch64", product_id: "freerdp-wayland-2.1.2-12.20.1.aarch64", }, }, { category: "product_version", name: "libfreerdp2-2.1.2-12.20.1.aarch64", product: { name: "libfreerdp2-2.1.2-12.20.1.aarch64", product_id: "libfreerdp2-2.1.2-12.20.1.aarch64", }, }, { category: "product_version", name: "libuwac0-0-2.1.2-12.20.1.aarch64", product: { name: "libuwac0-0-2.1.2-12.20.1.aarch64", product_id: "libuwac0-0-2.1.2-12.20.1.aarch64", }, }, { category: "product_version", name: "libwinpr2-2.1.2-12.20.1.aarch64", product: { name: "libwinpr2-2.1.2-12.20.1.aarch64", product_id: "libwinpr2-2.1.2-12.20.1.aarch64", }, }, { category: "product_version", name: "uwac0-0-devel-2.1.2-12.20.1.aarch64", product: { name: "uwac0-0-devel-2.1.2-12.20.1.aarch64", product_id: "uwac0-0-devel-2.1.2-12.20.1.aarch64", }, }, { category: "product_version", name: "vinagre-3.20.2-16.3.3.aarch64", product: { name: "vinagre-3.20.2-16.3.3.aarch64", product_id: "vinagre-3.20.2-16.3.3.aarch64", }, }, { category: "product_version", name: "winpr2-devel-2.1.2-12.20.1.aarch64", product: { name: "winpr2-devel-2.1.2-12.20.1.aarch64", product_id: "winpr2-devel-2.1.2-12.20.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "freerdp-2.1.2-12.20.1.i586", product: { name: "freerdp-2.1.2-12.20.1.i586", product_id: "freerdp-2.1.2-12.20.1.i586", }, }, { category: "product_version", name: "freerdp-devel-2.1.2-12.20.1.i586", product: { name: "freerdp-devel-2.1.2-12.20.1.i586", product_id: "freerdp-devel-2.1.2-12.20.1.i586", }, }, { category: "product_version", name: "freerdp-proxy-2.1.2-12.20.1.i586", product: { name: "freerdp-proxy-2.1.2-12.20.1.i586", product_id: "freerdp-proxy-2.1.2-12.20.1.i586", }, }, { category: "product_version", name: "freerdp-server-2.1.2-12.20.1.i586", product: { name: "freerdp-server-2.1.2-12.20.1.i586", product_id: "freerdp-server-2.1.2-12.20.1.i586", }, }, { category: "product_version", name: "freerdp-wayland-2.1.2-12.20.1.i586", product: { name: "freerdp-wayland-2.1.2-12.20.1.i586", product_id: "freerdp-wayland-2.1.2-12.20.1.i586", }, }, { category: "product_version", name: "libfreerdp2-2.1.2-12.20.1.i586", product: { name: "libfreerdp2-2.1.2-12.20.1.i586", product_id: "libfreerdp2-2.1.2-12.20.1.i586", }, }, { category: "product_version", name: "libuwac0-0-2.1.2-12.20.1.i586", product: { name: "libuwac0-0-2.1.2-12.20.1.i586", product_id: "libuwac0-0-2.1.2-12.20.1.i586", }, }, { category: "product_version", name: "libwinpr2-2.1.2-12.20.1.i586", product: { name: "libwinpr2-2.1.2-12.20.1.i586", product_id: "libwinpr2-2.1.2-12.20.1.i586", }, }, { category: "product_version", name: "uwac0-0-devel-2.1.2-12.20.1.i586", product: { name: "uwac0-0-devel-2.1.2-12.20.1.i586", product_id: "uwac0-0-devel-2.1.2-12.20.1.i586", }, }, { category: "product_version", name: "vinagre-3.20.2-16.3.3.i586", product: { name: "vinagre-3.20.2-16.3.3.i586", product_id: "vinagre-3.20.2-16.3.3.i586", }, }, { category: "product_version", name: "winpr2-devel-2.1.2-12.20.1.i586", product: { name: "winpr2-devel-2.1.2-12.20.1.i586", product_id: "winpr2-devel-2.1.2-12.20.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "vinagre-lang-3.20.2-16.3.3.noarch", product: { name: "vinagre-lang-3.20.2-16.3.3.noarch", product_id: "vinagre-lang-3.20.2-16.3.3.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "freerdp-2.1.2-12.20.1.ppc64le", product: { name: "freerdp-2.1.2-12.20.1.ppc64le", product_id: "freerdp-2.1.2-12.20.1.ppc64le", }, }, { category: "product_version", name: "freerdp-devel-2.1.2-12.20.1.ppc64le", product: { name: "freerdp-devel-2.1.2-12.20.1.ppc64le", product_id: "freerdp-devel-2.1.2-12.20.1.ppc64le", }, }, { category: "product_version", name: "freerdp-proxy-2.1.2-12.20.1.ppc64le", product: { name: "freerdp-proxy-2.1.2-12.20.1.ppc64le", product_id: "freerdp-proxy-2.1.2-12.20.1.ppc64le", }, }, { category: "product_version", name: "freerdp-server-2.1.2-12.20.1.ppc64le", product: { name: "freerdp-server-2.1.2-12.20.1.ppc64le", product_id: "freerdp-server-2.1.2-12.20.1.ppc64le", }, }, { category: "product_version", name: "freerdp-wayland-2.1.2-12.20.1.ppc64le", product: { name: "freerdp-wayland-2.1.2-12.20.1.ppc64le", product_id: "freerdp-wayland-2.1.2-12.20.1.ppc64le", }, }, { category: "product_version", name: "libfreerdp2-2.1.2-12.20.1.ppc64le", product: { name: "libfreerdp2-2.1.2-12.20.1.ppc64le", product_id: "libfreerdp2-2.1.2-12.20.1.ppc64le", }, }, { category: "product_version", name: "libuwac0-0-2.1.2-12.20.1.ppc64le", product: { name: "libuwac0-0-2.1.2-12.20.1.ppc64le", product_id: "libuwac0-0-2.1.2-12.20.1.ppc64le", }, }, { category: "product_version", name: "libwinpr2-2.1.2-12.20.1.ppc64le", product: { name: "libwinpr2-2.1.2-12.20.1.ppc64le", product_id: "libwinpr2-2.1.2-12.20.1.ppc64le", }, }, { category: "product_version", name: "uwac0-0-devel-2.1.2-12.20.1.ppc64le", product: { name: "uwac0-0-devel-2.1.2-12.20.1.ppc64le", product_id: "uwac0-0-devel-2.1.2-12.20.1.ppc64le", }, }, { category: "product_version", name: "vinagre-3.20.2-16.3.3.ppc64le", product: { name: "vinagre-3.20.2-16.3.3.ppc64le", product_id: "vinagre-3.20.2-16.3.3.ppc64le", }, }, { category: "product_version", name: "winpr2-devel-2.1.2-12.20.1.ppc64le", product: { name: "winpr2-devel-2.1.2-12.20.1.ppc64le", product_id: "winpr2-devel-2.1.2-12.20.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "freerdp-2.1.2-12.20.1.s390", product: { name: "freerdp-2.1.2-12.20.1.s390", product_id: "freerdp-2.1.2-12.20.1.s390", }, }, { category: "product_version", name: "freerdp-devel-2.1.2-12.20.1.s390", product: { name: "freerdp-devel-2.1.2-12.20.1.s390", product_id: "freerdp-devel-2.1.2-12.20.1.s390", }, }, { category: "product_version", name: "freerdp-proxy-2.1.2-12.20.1.s390", product: { name: "freerdp-proxy-2.1.2-12.20.1.s390", product_id: "freerdp-proxy-2.1.2-12.20.1.s390", }, }, { category: "product_version", name: "freerdp-server-2.1.2-12.20.1.s390", product: { name: "freerdp-server-2.1.2-12.20.1.s390", product_id: "freerdp-server-2.1.2-12.20.1.s390", }, }, { category: "product_version", name: "freerdp-wayland-2.1.2-12.20.1.s390", product: { name: "freerdp-wayland-2.1.2-12.20.1.s390", product_id: "freerdp-wayland-2.1.2-12.20.1.s390", }, }, { category: "product_version", name: "libfreerdp2-2.1.2-12.20.1.s390", product: { name: "libfreerdp2-2.1.2-12.20.1.s390", product_id: "libfreerdp2-2.1.2-12.20.1.s390", }, }, { category: "product_version", name: "libuwac0-0-2.1.2-12.20.1.s390", product: { name: "libuwac0-0-2.1.2-12.20.1.s390", product_id: "libuwac0-0-2.1.2-12.20.1.s390", }, }, { category: "product_version", name: "libwinpr2-2.1.2-12.20.1.s390", product: { name: "libwinpr2-2.1.2-12.20.1.s390", product_id: "libwinpr2-2.1.2-12.20.1.s390", }, }, { category: "product_version", name: "uwac0-0-devel-2.1.2-12.20.1.s390", product: { name: "uwac0-0-devel-2.1.2-12.20.1.s390", product_id: "uwac0-0-devel-2.1.2-12.20.1.s390", }, }, { category: "product_version", name: "vinagre-3.20.2-16.3.3.s390", product: { name: "vinagre-3.20.2-16.3.3.s390", product_id: "vinagre-3.20.2-16.3.3.s390", }, }, { category: "product_version", name: "winpr2-devel-2.1.2-12.20.1.s390", product: { name: "winpr2-devel-2.1.2-12.20.1.s390", product_id: "winpr2-devel-2.1.2-12.20.1.s390", }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "freerdp-2.1.2-12.20.1.s390x", product: { name: "freerdp-2.1.2-12.20.1.s390x", product_id: "freerdp-2.1.2-12.20.1.s390x", }, }, { category: "product_version", name: "freerdp-devel-2.1.2-12.20.1.s390x", product: { name: "freerdp-devel-2.1.2-12.20.1.s390x", product_id: "freerdp-devel-2.1.2-12.20.1.s390x", }, }, { category: "product_version", name: "freerdp-proxy-2.1.2-12.20.1.s390x", product: { name: "freerdp-proxy-2.1.2-12.20.1.s390x", product_id: "freerdp-proxy-2.1.2-12.20.1.s390x", }, }, { category: "product_version", name: "freerdp-server-2.1.2-12.20.1.s390x", product: { name: "freerdp-server-2.1.2-12.20.1.s390x", product_id: "freerdp-server-2.1.2-12.20.1.s390x", }, }, { category: "product_version", name: "freerdp-wayland-2.1.2-12.20.1.s390x", product: { name: "freerdp-wayland-2.1.2-12.20.1.s390x", product_id: "freerdp-wayland-2.1.2-12.20.1.s390x", }, }, { category: "product_version", name: "libfreerdp2-2.1.2-12.20.1.s390x", product: { name: "libfreerdp2-2.1.2-12.20.1.s390x", product_id: "libfreerdp2-2.1.2-12.20.1.s390x", }, }, { category: "product_version", name: "libuwac0-0-2.1.2-12.20.1.s390x", product: { name: "libuwac0-0-2.1.2-12.20.1.s390x", product_id: "libuwac0-0-2.1.2-12.20.1.s390x", }, }, { category: "product_version", name: "libwinpr2-2.1.2-12.20.1.s390x", product: { name: "libwinpr2-2.1.2-12.20.1.s390x", product_id: "libwinpr2-2.1.2-12.20.1.s390x", }, }, { category: "product_version", name: "uwac0-0-devel-2.1.2-12.20.1.s390x", product: { name: "uwac0-0-devel-2.1.2-12.20.1.s390x", product_id: "uwac0-0-devel-2.1.2-12.20.1.s390x", }, }, { category: "product_version", name: "vinagre-3.20.2-16.3.3.s390x", product: { name: "vinagre-3.20.2-16.3.3.s390x", product_id: "vinagre-3.20.2-16.3.3.s390x", }, }, { category: "product_version", name: "winpr2-devel-2.1.2-12.20.1.s390x", product: { name: "winpr2-devel-2.1.2-12.20.1.s390x", product_id: "winpr2-devel-2.1.2-12.20.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "freerdp-2.1.2-12.20.1.x86_64", product: { name: "freerdp-2.1.2-12.20.1.x86_64", product_id: "freerdp-2.1.2-12.20.1.x86_64", }, }, { category: "product_version", name: "freerdp-devel-2.1.2-12.20.1.x86_64", product: { name: "freerdp-devel-2.1.2-12.20.1.x86_64", product_id: "freerdp-devel-2.1.2-12.20.1.x86_64", }, }, { category: "product_version", name: "freerdp-proxy-2.1.2-12.20.1.x86_64", product: { name: "freerdp-proxy-2.1.2-12.20.1.x86_64", product_id: "freerdp-proxy-2.1.2-12.20.1.x86_64", }, }, { category: "product_version", name: "freerdp-server-2.1.2-12.20.1.x86_64", product: { name: "freerdp-server-2.1.2-12.20.1.x86_64", product_id: "freerdp-server-2.1.2-12.20.1.x86_64", }, }, { category: "product_version", name: "freerdp-wayland-2.1.2-12.20.1.x86_64", product: { name: "freerdp-wayland-2.1.2-12.20.1.x86_64", product_id: "freerdp-wayland-2.1.2-12.20.1.x86_64", }, }, { category: "product_version", name: "libfreerdp2-2.1.2-12.20.1.x86_64", product: { name: "libfreerdp2-2.1.2-12.20.1.x86_64", product_id: "libfreerdp2-2.1.2-12.20.1.x86_64", }, }, { category: "product_version", name: "libuwac0-0-2.1.2-12.20.1.x86_64", product: { name: "libuwac0-0-2.1.2-12.20.1.x86_64", product_id: "libuwac0-0-2.1.2-12.20.1.x86_64", }, }, { category: "product_version", name: "libwinpr2-2.1.2-12.20.1.x86_64", product: { name: "libwinpr2-2.1.2-12.20.1.x86_64", product_id: "libwinpr2-2.1.2-12.20.1.x86_64", }, }, { category: "product_version", name: "uwac0-0-devel-2.1.2-12.20.1.x86_64", product: { name: "uwac0-0-devel-2.1.2-12.20.1.x86_64", product_id: "uwac0-0-devel-2.1.2-12.20.1.x86_64", }, }, { category: "product_version", name: "vinagre-3.20.2-16.3.3.x86_64", product: { name: "vinagre-3.20.2-16.3.3.x86_64", product_id: "vinagre-3.20.2-16.3.3.x86_64", }, }, { category: "product_version", name: "winpr2-devel-2.1.2-12.20.1.x86_64", product: { name: "winpr2-devel-2.1.2-12.20.1.x86_64", product_id: "winpr2-devel-2.1.2-12.20.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP5", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 12 SP5", product: { name: "SUSE Linux Enterprise Workstation Extension 12 SP5", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:12:sp5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "freerdp-devel-2.1.2-12.20.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", }, product_reference: "freerdp-devel-2.1.2-12.20.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-2.1.2-12.20.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", }, product_reference: "freerdp-devel-2.1.2-12.20.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-2.1.2-12.20.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", }, product_reference: "freerdp-devel-2.1.2-12.20.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-2.1.2-12.20.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", }, product_reference: "freerdp-devel-2.1.2-12.20.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "libfreerdp2-2.1.2-12.20.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", }, product_reference: "libfreerdp2-2.1.2-12.20.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "libfreerdp2-2.1.2-12.20.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", }, product_reference: "libfreerdp2-2.1.2-12.20.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "libfreerdp2-2.1.2-12.20.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", }, product_reference: "libfreerdp2-2.1.2-12.20.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "libfreerdp2-2.1.2-12.20.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", }, product_reference: "libfreerdp2-2.1.2-12.20.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "libwinpr2-2.1.2-12.20.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", }, product_reference: "libwinpr2-2.1.2-12.20.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "libwinpr2-2.1.2-12.20.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", }, product_reference: "libwinpr2-2.1.2-12.20.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "libwinpr2-2.1.2-12.20.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", }, product_reference: "libwinpr2-2.1.2-12.20.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "libwinpr2-2.1.2-12.20.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", }, product_reference: "libwinpr2-2.1.2-12.20.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "winpr2-devel-2.1.2-12.20.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", }, product_reference: "winpr2-devel-2.1.2-12.20.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "winpr2-devel-2.1.2-12.20.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", }, product_reference: "winpr2-devel-2.1.2-12.20.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "winpr2-devel-2.1.2-12.20.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", }, product_reference: "winpr2-devel-2.1.2-12.20.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "winpr2-devel-2.1.2-12.20.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", }, product_reference: "winpr2-devel-2.1.2-12.20.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "freerdp-2.1.2-12.20.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", }, product_reference: "freerdp-2.1.2-12.20.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "freerdp-proxy-2.1.2-12.20.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", }, product_reference: "freerdp-proxy-2.1.2-12.20.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "freerdp-server-2.1.2-12.20.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", }, product_reference: "freerdp-server-2.1.2-12.20.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "libfreerdp2-2.1.2-12.20.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", }, product_reference: "libfreerdp2-2.1.2-12.20.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "libwinpr2-2.1.2-12.20.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", }, product_reference: "libwinpr2-2.1.2-12.20.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vinagre-3.20.2-16.3.3.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", }, product_reference: "vinagre-3.20.2-16.3.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vinagre-lang-3.20.2-16.3.3.noarch as component of SUSE Linux Enterprise Workstation Extension 12 SP5", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", }, product_reference: "vinagre-lang-3.20.2-16.3.3.noarch", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 12 SP5", }, ], }, vulnerabilities: [ { cve: "CVE-2017-2834", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-2834", }, ], notes: [ { category: "general", text: "An exploitable code execution vulnerability exists in the authentication functionality of FreeRDP 2.0.0-beta1+android11. A specially crafted server response can cause an out-of-bounds write resulting in an exploitable condition. An attacker can compromise the server or use a man in the middle attack to trigger this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2017-2834", url: "https://www.suse.com/security/cve/CVE-2017-2834", }, { category: "external", summary: "SUSE Bug 1050714 for CVE-2017-2834", url: "https://bugzilla.suse.com/1050714", }, { category: "external", summary: "SUSE Bug 1053919 for CVE-2017-2834", url: "https://bugzilla.suse.com/1053919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "important", }, ], title: "CVE-2017-2834", }, { cve: "CVE-2017-2835", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-2835", }, ], notes: [ { category: "general", text: "An exploitable code execution vulnerability exists in the RDP receive functionality of FreeRDP 2.0.0-beta1+android11. A specially crafted server response can cause an out-of-bounds write resulting in an exploitable condition. An attacker can compromise the server or use a man in the middle to trigger this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2017-2835", url: "https://www.suse.com/security/cve/CVE-2017-2835", }, { category: "external", summary: "SUSE Bug 1050712 for CVE-2017-2835", url: "https://bugzilla.suse.com/1050712", }, { category: "external", summary: "SUSE Bug 1053919 for CVE-2017-2835", url: "https://bugzilla.suse.com/1053919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "important", }, ], title: "CVE-2017-2835", }, { cve: "CVE-2017-2836", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-2836", }, ], notes: [ { category: "general", text: "An exploitable denial of service vulnerability exists within the reading of proprietary server certificates in FreeRDP 2.0.0-beta1+android11. A specially crafted challenge packet can cause the program termination leading to a denial of service condition. An attacker can compromise the server or use man in the middle to trigger this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2017-2836", url: "https://www.suse.com/security/cve/CVE-2017-2836", }, { category: "external", summary: "SUSE Bug 1050699 for CVE-2017-2836", url: "https://bugzilla.suse.com/1050699", }, { category: "external", summary: "SUSE Bug 1053919 for CVE-2017-2836", url: "https://bugzilla.suse.com/1053919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "moderate", }, ], title: "CVE-2017-2836", }, { cve: "CVE-2017-2837", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-2837", }, ], notes: [ { category: "general", text: "An exploitable denial of service vulnerability exists within the handling of security data in FreeRDP 2.0.0-beta1+android11. A specially crafted challenge packet can cause the program termination leading to a denial of service condition. An attacker can compromise the server or use man in the middle to trigger this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2017-2837", url: "https://www.suse.com/security/cve/CVE-2017-2837", }, { category: "external", summary: "SUSE Bug 1050704 for CVE-2017-2837", url: "https://bugzilla.suse.com/1050704", }, { category: "external", summary: "SUSE Bug 1050708 for CVE-2017-2837", url: "https://bugzilla.suse.com/1050708", }, { category: "external", summary: "SUSE Bug 1053919 for CVE-2017-2837", url: "https://bugzilla.suse.com/1053919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "moderate", }, ], title: "CVE-2017-2837", }, { cve: "CVE-2017-2838", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-2838", }, ], notes: [ { category: "general", text: "An exploitable denial of service vulnerability exists within the handling of challenge packets in FreeRDP 2.0.0-beta1+android11. A specially crafted challenge packet can cause the program termination leading to a denial of service condition. An attacker can compromise the server or use man in the middle to trigger this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2017-2838", url: "https://www.suse.com/security/cve/CVE-2017-2838", }, { category: "external", summary: "SUSE Bug 1050708 for CVE-2017-2838", url: "https://bugzilla.suse.com/1050708", }, { category: "external", summary: "SUSE Bug 1053919 for CVE-2017-2838", url: "https://bugzilla.suse.com/1053919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "moderate", }, ], title: "CVE-2017-2838", }, { cve: "CVE-2017-2839", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-2839", }, ], notes: [ { category: "general", text: "An exploitable denial of service vulnerability exists within the handling of challenge packets in FreeRDP 2.0.0-beta1+android11. A specially crafted challenge packet can cause the program termination leading to a denial of service condition. An attacker can compromise the server or use man in the middle to trigger this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2017-2839", url: "https://www.suse.com/security/cve/CVE-2017-2839", }, { category: "external", summary: "SUSE Bug 1050711 for CVE-2017-2839", url: "https://bugzilla.suse.com/1050711", }, { category: "external", summary: "SUSE Bug 1053919 for CVE-2017-2839", url: "https://bugzilla.suse.com/1053919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "moderate", }, ], title: "CVE-2017-2839", }, { cve: "CVE-2018-0886", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-0886", }, ], notes: [ { category: "general", text: "The Credential Security Support Provider protocol (CredSSP) in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709 Windows Server 2016 and Windows Server, version 1709 allows a remote code execution vulnerability due to how CredSSP validates request during the authentication process, aka \"CredSSP Remote Code Execution Vulnerability\".", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-0886", url: "https://www.suse.com/security/cve/CVE-2018-0886", }, { category: "external", summary: "SUSE Bug 1085416 for CVE-2018-0886", url: "https://bugzilla.suse.com/1085416", }, { category: "external", summary: "SUSE Bug 1087240 for CVE-2018-0886", url: "https://bugzilla.suse.com/1087240", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-0886", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-0886", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "important", }, ], title: "CVE-2018-0886", }, { cve: "CVE-2018-1000852", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000852", }, ], notes: [ { category: "general", text: "FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via RDPClient must connect the rdp server with echo option. This vulnerability appears to have been fixed in after commit 205c612820dac644d665b5bb1cdf437dc5ca01e3.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-1000852", url: "https://www.suse.com/security/cve/CVE-2018-1000852", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-1000852", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1120507 for CVE-2018-1000852", url: "https://bugzilla.suse.com/1120507", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-1000852", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "moderate", }, ], title: "CVE-2018-1000852", }, { cve: "CVE-2018-8784", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8784", }, ], notes: [ { category: "general", text: "FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress_segment() that results in a memory corruption and probably even a remote code execution.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-8784", url: "https://www.suse.com/security/cve/CVE-2018-8784", }, { category: "external", summary: "SUSE Bug 1116708 for CVE-2018-8784", url: "https://bugzilla.suse.com/1116708", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-8784", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-8784", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "important", }, ], title: "CVE-2018-8784", }, { cve: "CVE-2018-8785", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8785", }, ], notes: [ { category: "general", text: "FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress() that results in a memory corruption and probably even a remote code execution.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-8785", url: "https://www.suse.com/security/cve/CVE-2018-8785", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-8785", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1117967 for CVE-2018-8785", url: "https://bugzilla.suse.com/1117967", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-8785", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "important", }, ], title: "CVE-2018-8785", }, { cve: "CVE-2018-8786", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8786", }, ], notes: [ { category: "general", text: "FreeRDP prior to version 2.0.0-rc4 contains an Integer Truncation that leads to a Heap-Based Buffer Overflow in function update_read_bitmap_update() and results in a memory corruption and probably even a remote code execution.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-8786", url: "https://www.suse.com/security/cve/CVE-2018-8786", }, { category: "external", summary: "SUSE Bug 1116708 for CVE-2018-8786", url: "https://bugzilla.suse.com/1116708", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-8786", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1117966 for CVE-2018-8786", url: "https://bugzilla.suse.com/1117966", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-8786", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "important", }, ], title: "CVE-2018-8786", }, { cve: "CVE-2018-8787", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8787", }, ], notes: [ { category: "general", text: "FreeRDP prior to version 2.0.0-rc4 contains an Integer Overflow that leads to a Heap-Based Buffer Overflow in function gdi_Bitmap_Decompress() and results in a memory corruption and probably even a remote code execution.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-8787", url: "https://www.suse.com/security/cve/CVE-2018-8787", }, { category: "external", summary: "SUSE Bug 1116708 for CVE-2018-8787", url: "https://bugzilla.suse.com/1116708", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-8787", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1117964 for CVE-2018-8787", url: "https://bugzilla.suse.com/1117964", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-8787", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "important", }, ], title: "CVE-2018-8787", }, { cve: "CVE-2018-8788", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8788", }, ], notes: [ { category: "general", text: "FreeRDP prior to version 2.0.0-rc4 contains an Out-Of-Bounds Write of up to 4 bytes in function nsc_rle_decode() that results in a memory corruption and possibly even a remote code execution.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-8788", url: "https://www.suse.com/security/cve/CVE-2018-8788", }, { category: "external", summary: "SUSE Bug 1116708 for CVE-2018-8788", url: "https://bugzilla.suse.com/1116708", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-8788", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-8788", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "important", }, ], title: "CVE-2018-8788", }, { cve: "CVE-2018-8789", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8789", }, ], notes: [ { category: "general", text: "FreeRDP prior to version 2.0.0-rc4 contains several Out-Of-Bounds Reads in the NTLM Authentication module that results in a Denial of Service (segfault).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2018-8789", url: "https://www.suse.com/security/cve/CVE-2018-8789", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-8789", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1117965 for CVE-2018-8789", url: "https://bugzilla.suse.com/1117965", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-8789", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "moderate", }, ], title: "CVE-2018-8789", }, { cve: "CVE-2020-11017", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11017", }, ], notes: [ { category: "general", text: "In FreeRDP less than or equal to 2.0.0, by providing manipulated input a malicious client can create a double free condition and crash the server. This is fixed in version 2.1.0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-11017", url: "https://www.suse.com/security/cve/CVE-2020-11017", }, { category: "external", summary: "SUSE Bug 1171441 for CVE-2020-11017", url: "https://bugzilla.suse.com/1171441", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "moderate", }, ], title: "CVE-2020-11017", }, { cve: "CVE-2020-11018", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11018", }, ], notes: [ { category: "general", text: "In FreeRDP less than or equal to 2.0.0, a possible resource exhaustion vulnerability can be performed. Malicious clients could trigger out of bound reads causing memory allocation with random size. This has been fixed in 2.1.0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-11018", url: "https://www.suse.com/security/cve/CVE-2020-11018", }, { category: "external", summary: "SUSE Bug 1171441 for CVE-2020-11018", url: "https://bugzilla.suse.com/1171441", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "important", }, ], title: "CVE-2020-11018", }, { cve: "CVE-2020-11019", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11019", }, ], notes: [ { category: "general", text: "In FreeRDP less than or equal to 2.0.0, when running with logger set to \"WLOG_TRACE\", a possible crash of application could occur due to a read of an invalid array index. Data could be printed as string to local terminal. This has been fixed in 2.1.0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-11019", url: "https://www.suse.com/security/cve/CVE-2020-11019", }, { category: "external", summary: "SUSE Bug 1171441 for CVE-2020-11019", url: "https://bugzilla.suse.com/1171441", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "important", }, ], title: "CVE-2020-11019", }, { cve: "CVE-2020-11038", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11038", }, ], notes: [ { category: "general", text: "In FreeRDP less than or equal to 2.0.0, an Integer Overflow to Buffer Overflow exists. When using /video redirection, a manipulated server can instruct the client to allocate a buffer with a smaller size than requested due to an integer overflow in size calculation. With later messages, the server can manipulate the client to write data out of bound to the previously allocated buffer. This has been patched in 2.1.0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-11038", url: "https://www.suse.com/security/cve/CVE-2020-11038", }, { category: "external", summary: "SUSE Bug 1171441 for CVE-2020-11038", url: "https://bugzilla.suse.com/1171441", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "important", }, ], title: "CVE-2020-11038", }, { cve: "CVE-2020-11039", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11039", }, ], notes: [ { category: "general", text: "In FreeRDP less than or equal to 2.0.0, when using a manipulated server with USB redirection enabled (nearly) arbitrary memory can be read and written due to integer overflows in length checks. This has been patched in 2.1.0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-11039", url: "https://www.suse.com/security/cve/CVE-2020-11039", }, { category: "external", summary: "SUSE Bug 1171441 for CVE-2020-11039", url: "https://bugzilla.suse.com/1171441", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "important", }, ], title: "CVE-2020-11039", }, { cve: "CVE-2020-11040", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11040", }, ], notes: [ { category: "general", text: "In FreeRDP less than or equal to 2.0.0, there is an out-of-bound data read from memory in clear_decompress_subcode_rlex, visualized on screen as color. This has been patched in 2.1.0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-11040", url: "https://www.suse.com/security/cve/CVE-2020-11040", }, { category: "external", summary: "SUSE Bug 1171441 for CVE-2020-11040", url: "https://bugzilla.suse.com/1171441", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 2.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "important", }, ], title: "CVE-2020-11040", }, { cve: "CVE-2020-11041", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11041", }, ], notes: [ { category: "general", text: "In FreeRDP less than or equal to 2.0.0, an outside controlled array index is used unchecked for data used as configuration for sound backend (alsa, oss, pulse, ...). The most likely outcome is a crash of the client instance followed by no or distorted sound or a session disconnect. If a user cannot upgrade to the patched version, a workaround is to disable sound for the session. This has been patched in 2.1.0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-11041", url: "https://www.suse.com/security/cve/CVE-2020-11041", }, { category: "external", summary: "SUSE Bug 1171441 for CVE-2020-11041", url: "https://bugzilla.suse.com/1171441", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 2.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "important", }, ], title: "CVE-2020-11041", }, { cve: "CVE-2020-11043", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11043", }, ], notes: [ { category: "general", text: "In FreeRDP less than or equal to 2.0.0, there is an out-of-bounds read in rfx_process_message_tileset. Invalid data fed to RFX decoder results in garbage on screen (as colors). This has been patched in 2.1.0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-11043", url: "https://www.suse.com/security/cve/CVE-2020-11043", }, { category: "external", summary: "SUSE Bug 1171441 for CVE-2020-11043", url: "https://bugzilla.suse.com/1171441", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 2.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "important", }, ], title: "CVE-2020-11043", }, { cve: "CVE-2020-11085", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11085", }, ], notes: [ { category: "general", text: "In FreeRDP before 2.1.0, there is an out-of-bounds read in cliprdr_read_format_list. Clipboard format data read (by client or server) might read data out-of-bounds. This has been fixed in 2.1.0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-11085", url: "https://www.suse.com/security/cve/CVE-2020-11085", }, { category: "external", summary: "SUSE Bug 1171441 for CVE-2020-11085", url: "https://bugzilla.suse.com/1171441", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 2.6, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "important", }, ], title: "CVE-2020-11085", }, { cve: "CVE-2020-11086", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11086", }, ], notes: [ { category: "general", text: "In FreeRDP less than or equal to 2.0.0, there is an out-of-bound read in ntlm_read_ntlm_v2_client_challenge that reads up to 28 bytes out-of-bound to an internal structure. This has been fixed in 2.1.0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-11086", url: "https://www.suse.com/security/cve/CVE-2020-11086", }, { category: "external", summary: "SUSE Bug 1171441 for CVE-2020-11086", url: "https://bugzilla.suse.com/1171441", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "important", }, ], title: "CVE-2020-11086", }, { cve: "CVE-2020-11087", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11087", }, ], notes: [ { category: "general", text: "In FreeRDP less than or equal to 2.0.0, there is an out-of-bound read in ntlm_read_AuthenticateMessage. This has been fixed in 2.1.0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-11087", url: "https://www.suse.com/security/cve/CVE-2020-11087", }, { category: "external", summary: "SUSE Bug 1171441 for CVE-2020-11087", url: "https://bugzilla.suse.com/1171441", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "important", }, ], title: "CVE-2020-11087", }, { cve: "CVE-2020-11088", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11088", }, ], notes: [ { category: "general", text: "In FreeRDP less than or equal to 2.0.0, there is an out-of-bound read in ntlm_read_NegotiateMessage. This has been fixed in 2.1.0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-11088", url: "https://www.suse.com/security/cve/CVE-2020-11088", }, { category: "external", summary: "SUSE Bug 1171441 for CVE-2020-11088", url: "https://bugzilla.suse.com/1171441", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "important", }, ], title: "CVE-2020-11088", }, { cve: "CVE-2020-11089", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11089", }, ], notes: [ { category: "general", text: "In FreeRDP before 2.1.0, there is an out-of-bound read in irp functions (parallel_process_irp_create, serial_process_irp_create, drive_process_irp_write, printer_process_irp_write, rdpei_recv_pdu, serial_process_irp_write). This has been fixed in 2.1.0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-11089", url: "https://www.suse.com/security/cve/CVE-2020-11089", }, { category: "external", summary: "SUSE Bug 1171441 for CVE-2020-11089", url: "https://bugzilla.suse.com/1171441", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "important", }, ], title: "CVE-2020-11089", }, { cve: "CVE-2020-11095", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11095", }, ], notes: [ { category: "general", text: "In FreeRDP before version 2.1.2, an out of bound reads occurs resulting in accessing a memory location that is outside of the boundaries of the static array PRIMARY_DRAWING_ORDER_FIELD_BYTES. This is fixed in version 2.1.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-11095", url: "https://www.suse.com/security/cve/CVE-2020-11095", }, { category: "external", summary: "SUSE Bug 1173247 for CVE-2020-11095", url: "https://bugzilla.suse.com/1173247", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "moderate", }, ], title: "CVE-2020-11095", }, { cve: "CVE-2020-11096", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11096", }, ], notes: [ { category: "general", text: "In FreeRDP before version 2.1.2, there is a global OOB read in update_read_cache_bitmap_v3_order. As a workaround, one can disable bitmap cache with -bitmap-cache (default). This is fixed in version 2.1.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-11096", url: "https://www.suse.com/security/cve/CVE-2020-11096", }, { category: "external", summary: "SUSE Bug 1173247 for CVE-2020-11096", url: "https://bugzilla.suse.com/1173247", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "moderate", }, ], title: "CVE-2020-11096", }, { cve: "CVE-2020-11097", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11097", }, ], notes: [ { category: "general", text: "In FreeRDP before version 2.1.2, an out of bounds read occurs resulting in accessing a memory location that is outside of the boundaries of the static array PRIMARY_DRAWING_ORDER_FIELD_BYTES. This is fixed in version 2.1.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-11097", url: "https://www.suse.com/security/cve/CVE-2020-11097", }, { category: "external", summary: "SUSE Bug 1173247 for CVE-2020-11097", url: "https://bugzilla.suse.com/1173247", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "moderate", }, ], title: "CVE-2020-11097", }, { cve: "CVE-2020-11098", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11098", }, ], notes: [ { category: "general", text: "In FreeRDP before version 2.1.2, there is an out-of-bound read in glyph_cache_put. This affects all FreeRDP clients with `+glyph-cache` option enabled This is fixed in version 2.1.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-11098", url: "https://www.suse.com/security/cve/CVE-2020-11098", }, { category: "external", summary: "SUSE Bug 1173247 for CVE-2020-11098", url: "https://bugzilla.suse.com/1173247", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "moderate", }, ], title: "CVE-2020-11098", }, { cve: "CVE-2020-11099", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11099", }, ], notes: [ { category: "general", text: "In FreeRDP before version 2.1.2, there is an out of bounds read in license_read_new_or_upgrade_license_packet. A manipulated license packet can lead to out of bound reads to an internal buffer. This is fixed in version 2.1.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-11099", url: "https://www.suse.com/security/cve/CVE-2020-11099", }, { category: "external", summary: "SUSE Bug 1173247 for CVE-2020-11099", url: "https://bugzilla.suse.com/1173247", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "moderate", }, ], title: "CVE-2020-11099", }, { cve: "CVE-2020-11521", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11521", }, ], notes: [ { category: "general", text: "libfreerdp/codec/planar.c in FreeRDP version > 1.0 through 2.0.0-rc4 has an Out-of-bounds Write.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-11521", url: "https://www.suse.com/security/cve/CVE-2020-11521", }, { category: "external", summary: "SUSE Bug 1169413 for CVE-2020-11521", url: "https://bugzilla.suse.com/1169413", }, { category: "external", summary: "SUSE Bug 1171443 for CVE-2020-11521", url: "https://bugzilla.suse.com/1171443", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "moderate", }, ], title: "CVE-2020-11521", }, { cve: "CVE-2020-11522", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11522", }, ], notes: [ { category: "general", text: "libfreerdp/gdi/gdi.c in FreeRDP > 1.0 through 2.0.0-rc4 has an Out-of-bounds Read.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-11522", url: "https://www.suse.com/security/cve/CVE-2020-11522", }, { category: "external", summary: "SUSE Bug 1169413 for CVE-2020-11522", url: "https://bugzilla.suse.com/1169413", }, { category: "external", summary: "SUSE Bug 1171444 for CVE-2020-11522", url: "https://bugzilla.suse.com/1171444", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "moderate", }, ], title: "CVE-2020-11522", }, { cve: "CVE-2020-11523", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11523", }, ], notes: [ { category: "general", text: "libfreerdp/gdi/region.c in FreeRDP versions > 1.0 through 2.0.0-rc4 has an Integer Overflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-11523", url: "https://www.suse.com/security/cve/CVE-2020-11523", }, { category: "external", summary: "SUSE Bug 1169413 for CVE-2020-11523", url: "https://bugzilla.suse.com/1169413", }, { category: "external", summary: "SUSE Bug 1171445 for CVE-2020-11523", url: "https://bugzilla.suse.com/1171445", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "moderate", }, ], title: "CVE-2020-11523", }, { cve: "CVE-2020-11524", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11524", }, ], notes: [ { category: "general", text: "libfreerdp/codec/interleaved.c in FreeRDP versions > 1.0 through 2.0.0-rc4 has an Out-of-bounds Write.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-11524", url: "https://www.suse.com/security/cve/CVE-2020-11524", }, { category: "external", summary: "SUSE Bug 1169413 for CVE-2020-11524", url: "https://bugzilla.suse.com/1169413", }, { category: "external", summary: "SUSE Bug 1171446 for CVE-2020-11524", url: "https://bugzilla.suse.com/1171446", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "moderate", }, ], title: "CVE-2020-11524", }, { cve: "CVE-2020-11525", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11525", }, ], notes: [ { category: "general", text: "libfreerdp/cache/bitmap.c in FreeRDP versions > 1.0 through 2.0.0-rc4 has an Out of bounds read.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-11525", url: "https://www.suse.com/security/cve/CVE-2020-11525", }, { category: "external", summary: "SUSE Bug 1169413 for CVE-2020-11525", url: "https://bugzilla.suse.com/1169413", }, { category: "external", summary: "SUSE Bug 1171447 for CVE-2020-11525", url: "https://bugzilla.suse.com/1171447", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 2.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "low", }, ], title: "CVE-2020-11525", }, { cve: "CVE-2020-11526", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11526", }, ], notes: [ { category: "general", text: "libfreerdp/core/update.c in FreeRDP versions > 1.1 through 2.0.0-rc4 has an Out-of-bounds Read.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-11526", url: "https://www.suse.com/security/cve/CVE-2020-11526", }, { category: "external", summary: "SUSE Bug 1169413 for CVE-2020-11526", url: "https://bugzilla.suse.com/1169413", }, { category: "external", summary: "SUSE Bug 1171674 for CVE-2020-11526", url: "https://bugzilla.suse.com/1171674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 2.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "low", }, ], title: "CVE-2020-11526", }, { cve: "CVE-2020-13396", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-13396", }, ], notes: [ { category: "general", text: "An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB) read vulnerability has been detected in ntlm_read_ChallengeMessage in winpr/libwinpr/sspi/NTLM/ntlm_message.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-13396", url: "https://www.suse.com/security/cve/CVE-2020-13396", }, { category: "external", summary: "SUSE Bug 1171441 for CVE-2020-13396", url: "https://bugzilla.suse.com/1171441", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "important", }, ], title: "CVE-2020-13396", }, { cve: "CVE-2020-13397", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-13397", }, ], notes: [ { category: "general", text: "An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB) read vulnerability has been detected in security_fips_decrypt in libfreerdp/core/security.c due to an uninitialized value.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-13397", url: "https://www.suse.com/security/cve/CVE-2020-13397", }, { category: "external", summary: "SUSE Bug 1171441 for CVE-2020-13397", url: "https://bugzilla.suse.com/1171441", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "important", }, ], title: "CVE-2020-13397", }, { cve: "CVE-2020-13398", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-13398", }, ], notes: [ { category: "general", text: "An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB) write vulnerability has been detected in crypto_rsa_common in libfreerdp/crypto/crypto.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-13398", url: "https://www.suse.com/security/cve/CVE-2020-13398", }, { category: "external", summary: "SUSE Bug 1171441 for CVE-2020-13398", url: "https://bugzilla.suse.com/1171441", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "important", }, ], title: "CVE-2020-13398", }, { cve: "CVE-2020-15103", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-15103", }, ], notes: [ { category: "general", text: "In FreeRDP less than or equal to 2.1.2, an integer overflow exists due to missing input sanitation in rdpegfx channel. All FreeRDP clients are affected. The input rectangles from the server are not checked against local surface coordinates and blindly accepted. A malicious server can send data that will crash the client later on (invalid length arguments to a `memcpy`) This has been fixed in 2.2.0. As a workaround, stop using command line arguments /gfx, /gfx-h264 and /network:auto", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-15103", url: "https://www.suse.com/security/cve/CVE-2020-15103", }, { category: "external", summary: "SUSE Bug 1174321 for CVE-2020-15103", url: "https://bugzilla.suse.com/1174321", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "important", }, ], title: "CVE-2020-15103", }, { cve: "CVE-2020-4030", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-4030", }, ], notes: [ { category: "general", text: "In FreeRDP before version 2.1.2, there is an out of bounds read in TrioParse. Logging might bypass string length checks due to an integer overflow. This is fixed in version 2.1.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-4030", url: "https://www.suse.com/security/cve/CVE-2020-4030", }, { category: "external", summary: "SUSE Bug 1173247 for CVE-2020-4030", url: "https://bugzilla.suse.com/1173247", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "moderate", }, ], title: "CVE-2020-4030", }, { cve: "CVE-2020-4031", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-4031", }, ], notes: [ { category: "general", text: "In FreeRDP before version 2.1.2, there is a use-after-free in gdi_SelectObject. All FreeRDP clients using compatibility mode with /relax-order-checks are affected. This is fixed in version 2.1.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-4031", url: "https://www.suse.com/security/cve/CVE-2020-4031", }, { category: "external", summary: "SUSE Bug 1173247 for CVE-2020-4031", url: "https://bugzilla.suse.com/1173247", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "moderate", }, ], title: "CVE-2020-4031", }, { cve: "CVE-2020-4032", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-4032", }, ], notes: [ { category: "general", text: "In FreeRDP before version 2.1.2, there is an integer casting vulnerability in update_recv_secondary_order. All clients with +glyph-cache /relax-order-checks are affected. This is fixed in version 2.1.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-4032", url: "https://www.suse.com/security/cve/CVE-2020-4032", }, { category: "external", summary: "SUSE Bug 1173247 for CVE-2020-4032", url: "https://bugzilla.suse.com/1173247", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "moderate", }, ], title: "CVE-2020-4032", }, { cve: "CVE-2020-4033", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-4033", }, ], notes: [ { category: "general", text: "In FreeRDP before version 2.1.2, there is an out of bounds read in RLEDECOMPRESS. All FreeRDP based clients with sessions with color depth < 32 are affected. This is fixed in version 2.1.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-4033", url: "https://www.suse.com/security/cve/CVE-2020-4033", }, { category: "external", summary: "SUSE Bug 1173247 for CVE-2020-4033", url: "https://bugzilla.suse.com/1173247", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:freerdp-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:winpr2-devel-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-proxy-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:freerdp-server-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libfreerdp2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libwinpr2-2.1.2-12.20.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-3.20.2-16.3.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:vinagre-lang-3.20.2-16.3.3.noarch", ], }, ], threats: [ { category: "impact", date: "2020-08-18T14:44:51Z", details: "moderate", }, ], title: "CVE-2020-4033", }, ], }
wid-sec-w-2022-0517
Vulnerability from csaf_certbund
Published
2019-08-06 22:00
Modified
2024-09-02 22:00
Summary
Red Hat Enterprise Linux: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat Enterprise Linux (RHEL) ist eine populäre Linux-Distribution.
Angriff
Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux ausnutzen, um dadurch die Integrität, Vertraulichkeit und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- Linux
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Red Hat Enterprise Linux (RHEL) ist eine populäre Linux-Distribution.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux ausnutzen, um dadurch die Integrität, Vertraulichkeit und Verfügbarkeit zu gefährden.", title: "Angriff", }, { category: "general", text: "- Linux", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-0517 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2022-0517.json", }, { category: "self", summary: "WID-SEC-2022-0517 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0517", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2332 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2332", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2336 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2336", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2308 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2308", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2285 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2285", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2290 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2290", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2280 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2280", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2283 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2283", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2272 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2272", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2276 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2276", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2258 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2258", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2229 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2229", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2237 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2237", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2196 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2196", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2197 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2197", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2189 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2189", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2177 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2177", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2178 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2178", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2162 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2162", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2157 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2157", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2137 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2137", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2125 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2125", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2126 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2126", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2112 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2112", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2101 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2101", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2075 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2075", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2049 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2049", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2052 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2052", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2047 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2047", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2048 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2048", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2035 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2035", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2037 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2037", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2017 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2017", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:0471 vom 2020-02-11", url: "https://access.redhat.com/errata/RHSA-2020:0471", }, { category: "external", summary: "CentOS Security Advisory CESA-2020:0471 vom 2020-02-11", url: "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2020-0471-Moderate-CentOS-6-spice-gtk-Security-Update-tp4645840.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2437 vom 2019-08-12", url: "https://access.redhat.com/errata/RHSA-2019:2437", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2019-2285 vom 2019-08-14", url: "http://linux.oracle.com/errata/ELSA-2019-2285.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2019-2052 vom 2019-08-14", url: "http://linux.oracle.com/errata/ELSA-2019-2052.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2019-2258 vom 2019-08-14", url: "http://linux.oracle.com/errata/ELSA-2019-2258.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2019-2178 vom 2019-08-14", url: "http://linux.oracle.com/errata/ELSA-2019-2178.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2019-2229 vom 2019-08-14", url: "http://linux.oracle.com/errata/ELSA-2019-2229.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2019-2177 vom 2019-08-16", url: "http://linux.oracle.com/errata/ELSA-2019-2177.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2019-2283 vom 2019-08-19", url: "http://linux.oracle.com/errata/ELSA-2019-2283.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2019-2189 vom 2019-08-21", url: "http://linux.oracle.com/errata/ELSA-2019-2189.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2019-2280 vom 2019-08-21", url: "http://linux.oracle.com/errata/ELSA-2019-2280.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2019-2332 vom 2019-08-21", url: "http://linux.oracle.com/errata/ELSA-2019-2332.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:2267-1 vom 2019-09-02", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192267-1.html", }, { category: "external", summary: "CentOS Security Advisory CESA-2019:2101 vom 2019-09-18", url: "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-2101-Low-CentOS-7-exiv2-Security-Update-tp4645686.html", }, { category: "external", summary: "CentOS Security Advisory CESA-2019:2258 vom 2019-09-18", url: "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-2258-Moderate-CentOS-7-http-parser-Security-Update-tp4645679.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:2730-1 vom 2019-10-22", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192730-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:2750-1 vom 2019-10-23", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192750-1.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:3338 vom 2019-11-05", url: "https://access.redhat.com/errata/RHSA-2019:3338", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:3651 vom 2019-11-05", url: "https://access.redhat.com/errata/RHSA-2019:3651", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:3575 vom 2019-11-05", url: "https://access.redhat.com/errata/RHSA-2019:3575", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:3583 vom 2019-11-06", url: "https://access.redhat.com/errata/RHSA-2019:3583", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:3590 vom 2019-11-05", url: "https://access.redhat.com/errata/RHSA-2019:3590", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:3345 vom 2019-11-06", url: "https://access.redhat.com/errata/RHSA-2019:3345", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:3497 vom 2019-11-05", url: "https://access.redhat.com/errata/RHSA-2019:3497", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:3335 vom 2019-11-05", url: "https://access.redhat.com/errata/RHSA-2019:3335", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:3705 vom 2019-11-05", url: "https://access.redhat.com/errata/RHSA-2019:3705", }, { category: "external", summary: "AVAYA Security Advisory ASA-2019-209 vom 2019-12-22", url: "https://downloads.avaya.com/css/P8/documents/101060434", }, { category: "external", summary: "AVAYA Security Advisory ASA-2019-205 vom 2019-12-22", url: "https://downloads.avaya.com/css/P8/documents/101060432", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:0595 vom 2020-02-25", url: "https://access.redhat.com/errata/RHSA-2020:0595", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0555-1 vom 2020-03-02", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200555-1.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:0850 vom 2020-03-17", url: "https://access.redhat.com/errata/RHSA-2020:0850", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:0851 vom 2020-03-17", url: "https://access.redhat.com/errata/RHSA-2020:0851", }, { category: "external", summary: "CentOS Security Advisory CESA-2020:0851 vom 2020-03-25", url: "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2020-0851-Moderate-CentOS-7-python-virtualenv-Security-Update-tp4645882.html", }, { category: "external", summary: "CentOS Security Advisory CESA-2020:0850 vom 2020-03-25", url: "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2020-0850-Moderate-CentOS-7-python-pip-Security-Update-tp4645865.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:1265 vom 2020-04-01", url: "https://access.redhat.com/errata/RHSA-2020:1265", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0921-1 vom 2020-04-04", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200921-1.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:1471 vom 2020-04-14", url: "https://access.redhat.com/errata/RHSA-2020:1471", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:1464 vom 2020-04-14", url: "https://access.redhat.com/errata/RHSA-2020:1464", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:1461 vom 2020-04-14", url: "https://access.redhat.com/errata/RHSA-2020:1461", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:1577 vom 2020-04-28", url: "https://access.redhat.com/errata/RHSA-2020:1577", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:1916 vom 2020-04-28", url: "https://access.redhat.com/errata/RHSA-2020:1916", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:1605 vom 2020-04-28", url: "https://access.redhat.com/errata/RHSA-2020:1605", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:2068 vom 2020-05-12", url: "https://access.redhat.com/errata/RHSA-2020:2068", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:2081 vom 2020-05-12", url: "https://access.redhat.com/errata/RHSA-2020:2081", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:1792-1 vom 2020-06-26", url: "http://lists.suse.com/pipermail/sle-security-updates/2020-June/007049.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:3194 vom 2020-07-28", url: "https://access.redhat.com/errata/RHSA-2020:3194", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:2711-1 vom 2020-09-22", url: "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007450.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:2942-1 vom 2020-10-16", url: "http://lists.suse.com/pipermail/sle-security-updates/2020-October/007582.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:4999 vom 2020-11-10", url: "https://access.redhat.com/errata/RHSA-2020:4999", }, { category: "external", summary: "Debian Security Advisory DLA-2470 vom 2020-12-01", url: "https://lists.debian.org/debian-lts-announce/2020/12/msg00000.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:3842-1 vom 2020-12-16", url: "https://lists.suse.com/pipermail/sle-security-updates/2020-December/008077.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:3841-1 vom 2020-12-16", url: "https://lists.suse.com/pipermail/sle-security-updates/2020-December/008078.html", }, { category: "external", summary: "F5 Security Advisory K00409335 vom 2020-12-29", url: "https://support.f5.com/csp/article/K00409335?utm_source=f5support&utm_medium=RSS", }, { category: "external", summary: "Debian Security Advisory DLA-2645 vom 2021-04-29", url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00032.html", }, { category: "external", summary: "Gentoo Linux Security Advisory GLSA-202107-15 vom 2021-07-08", url: "https://www.cybersecurity-help.cz/vdb/SB2021070803", }, { category: "external", summary: "Debian Security Advisory DLA-2802 vom 2021-10-31", url: "https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:1819-1 vom 2022-05-23", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011137.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:1448-1 vom 2022-04-28", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010858.html", }, { category: "external", summary: "Ubuntu Security Notice USN-5497-1 vom 2022-06-30", url: "https://ubuntu.com/security/notices/USN-5497-1", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2614-1 vom 2022-08-01", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html", }, { category: "external", summary: "Ubuntu Security Notice USN-5553-1 vom 2022-08-08", url: "https://ubuntu.com/security/notices/USN-5553-1", }, { category: "external", summary: "Ubuntu Security Notice USN-5631-1 vom 2022-09-22", url: "https://ubuntu.com/security/notices/USN-5631-1", }, { category: "external", summary: "Ubuntu Security Notice USN-5671-1 vom 2022-10-12", url: "https://ubuntu.com/security/notices/USN-5671-1", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:4252-1 vom 2022-11-28", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-November/013131.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2023-1939 vom 2023-02-22", url: "https://alas.aws.amazon.com/AL2/ALAS-2023-1939.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2023-1940 vom 2023-02-22", url: "https://alas.aws.amazon.com/AL2/ALAS-2023-1940.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2023-6980 vom 2023-11-21", url: "https://linux.oracle.com/errata/ELSA-2023-6980.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2024-12605 vom 2024-09-02", url: "https://linux.oracle.com/errata/ELSA-2024-12605.html", }, ], source_lang: "en-US", title: "Red Hat Enterprise Linux: Mehrere Schwachstellen", tracking: { current_release_date: "2024-09-02T22:00:00.000+00:00", generator: { date: "2024-09-03T08:16:21.549+00:00", engine: { name: "BSI-WID", version: "1.3.6", }, }, id: "WID-SEC-W-2022-0517", initial_release_date: "2019-08-06T22:00:00.000+00:00", revision_history: [ { date: "2019-08-06T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2019-08-12T22:00:00.000+00:00", number: "2", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2019-08-13T22:00:00.000+00:00", number: "3", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2019-08-18T22:00:00.000+00:00", number: "4", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2019-08-19T22:00:00.000+00:00", number: "5", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2019-08-21T22:00:00.000+00:00", number: "6", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2019-09-02T22:00:00.000+00:00", number: "7", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-09-18T22:00:00.000+00:00", number: "8", summary: "Neue Updates von CentOS aufgenommen", }, { date: "2019-10-09T22:00:00.000+00:00", number: "9", summary: "Referenz(en) aufgenommen: SUSE-SU-2019:1487-2", }, { date: "2019-10-15T22:00:00.000+00:00", number: "10", summary: "Referenz(en) aufgenommen: FEDORA-2019-7B06F18A10, FEDORA-2019-A25D5DF3B4, FEDORA-2019-23638D42F3", }, { date: "2019-10-21T22:00:00.000+00:00", number: "11", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-10-23T22:00:00.000+00:00", number: "12", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-11-05T23:00:00.000+00:00", number: "13", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2019-12-22T23:00:00.000+00:00", number: "14", summary: "Neue Updates von AVAYA aufgenommen", }, { date: "2020-01-30T23:00:00.000+00:00", number: "15", summary: "Referenz(en) aufgenommen: FEDORA-2020-CB7B7181A0, FEDORA-2020-1DFAA1963B", }, { date: "2020-02-10T23:00:00.000+00:00", number: "16", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-02-11T23:00:00.000+00:00", number: "17", summary: "Neue Updates von CentOS aufgenommen", }, { date: "2020-02-24T23:00:00.000+00:00", number: "18", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-03-02T23:00:00.000+00:00", number: "19", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-03-17T23:00:00.000+00:00", number: "20", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-03-25T23:00:00.000+00:00", number: "21", summary: "Neue Updates von CentOS aufgenommen", }, { date: "2020-03-31T22:00:00.000+00:00", number: "22", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-04-05T22:00:00.000+00:00", number: "23", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-04-14T22:00:00.000+00:00", number: "24", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-04-28T22:00:00.000+00:00", number: "25", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-05-03T22:00:00.000+00:00", number: "26", summary: "Referenz(en) aufgenommen: USN-4349-1", }, { date: "2020-05-12T22:00:00.000+00:00", number: "27", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-06-28T22:00:00.000+00:00", number: "28", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-07-28T22:00:00.000+00:00", number: "29", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-09-22T22:00:00.000+00:00", number: "30", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-10-18T22:00:00.000+00:00", number: "31", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-11-09T23:00:00.000+00:00", number: "32", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-11-30T23:00:00.000+00:00", number: "33", summary: "Neue Updates von Debian aufgenommen", }, { date: "2020-12-16T23:00:00.000+00:00", number: "34", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-12-28T23:00:00.000+00:00", number: "35", summary: "Neue Updates von F5 aufgenommen", }, { date: "2021-04-29T22:00:00.000+00:00", number: "36", summary: "Neue Updates von Debian aufgenommen", }, { date: "2021-07-07T22:00:00.000+00:00", number: "37", summary: "Neue Updates von Gentoo aufgenommen", }, { date: "2021-09-08T22:00:00.000+00:00", number: "38", summary: "Referenz(en) aufgenommen: USN-5067-1", }, { date: "2021-10-31T23:00:00.000+00:00", number: "39", summary: "Neue Updates von Debian aufgenommen", }, { date: "2022-04-28T22:00:00.000+00:00", number: "40", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-05-23T22:00:00.000+00:00", number: "41", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-06-30T22:00:00.000+00:00", number: "42", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-08-01T22:00:00.000+00:00", number: "43", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-08-08T22:00:00.000+00:00", number: "44", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-09-22T22:00:00.000+00:00", number: "45", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-10-11T22:00:00.000+00:00", number: "46", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-11-28T23:00:00.000+00:00", number: "47", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-02-22T23:00:00.000+00:00", number: "48", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2023-11-21T23:00:00.000+00:00", number: "49", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2024-09-02T22:00:00.000+00:00", number: "50", summary: "Neue Updates von Oracle Linux aufgenommen", }, ], status: "final", version: "50", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "F5 BIG-IP", product: { name: "F5 BIG-IP", product_id: "T001663", product_identification_helper: { cpe: "cpe:/a:f5:big-ip:-", }, }, }, ], category: "vendor", name: "F5", }, { branches: [ { category: "product_name", name: "Gentoo Linux", product: { name: "Gentoo Linux", product_id: "T012167", product_identification_helper: { cpe: "cpe:/o:gentoo:linux:-", }, }, }, ], category: "vendor", name: "Gentoo", }, { branches: [ { category: "product_name", name: "Open Source CentOS", product: { name: "Open Source CentOS", product_id: "1727", product_identification_helper: { cpe: "cpe:/o:centos:centos:-", }, }, }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Oracle Linux", product: { name: "Oracle Linux", product_id: "T004914", product_identification_helper: { cpe: "cpe:/o:oracle:linux:-", }, }, }, ], category: "vendor", name: "Oracle", }, { branches: [ { branches: [ { category: "product_version", name: "7", product: { name: "Red Hat Enterprise Linux 7", product_id: "T006054", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7", }, }, }, ], category: "product_name", name: "Enterprise Linux", }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2016-3616", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2016-3616", }, { cve: "CVE-2017-15111", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2017-15111", }, { cve: "CVE-2017-15112", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2017-15112", }, { cve: "CVE-2017-17724", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2017-17724", }, { cve: "CVE-2017-18189", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2017-18189", }, { cve: "CVE-2017-18233", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2017-18233", }, { cve: "CVE-2017-18234", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2017-18234", }, { cve: "CVE-2017-18236", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2017-18236", }, { cve: "CVE-2017-18238", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2017-18238", }, { cve: "CVE-2017-5731", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2017-5731", }, { cve: "CVE-2017-5732", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2017-5732", }, { cve: "CVE-2017-5733", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2017-5733", }, { cve: "CVE-2017-5734", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2017-5734", }, { cve: "CVE-2017-5735", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2017-5735", }, { cve: "CVE-2017-6059", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2017-6059", }, { cve: "CVE-2017-6413", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2017-6413", }, { cve: "CVE-2018-0495", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-0495", }, { cve: "CVE-2018-1000132", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-1000132", }, { cve: "CVE-2018-1000852", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-1000852", }, { cve: "CVE-2018-1000876", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-1000876", }, { cve: "CVE-2018-10689", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-10689", }, { cve: "CVE-2018-10772", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-10772", }, { cve: "CVE-2018-10893", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-10893", }, { cve: "CVE-2018-10958", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-10958", }, { cve: "CVE-2018-10998", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-10998", }, { cve: "CVE-2018-11037", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-11037", }, { cve: "CVE-2018-11212", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-11212", }, { cve: "CVE-2018-11213", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-11213", }, { cve: "CVE-2018-11214", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-11214", }, { cve: "CVE-2018-1122", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-1122", }, { cve: "CVE-2018-11813", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-11813", }, { cve: "CVE-2018-12121", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-12121", }, { cve: "CVE-2018-12181", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-12181", }, { cve: "CVE-2018-12264", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-12264", }, { cve: "CVE-2018-12265", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-12265", }, { cve: "CVE-2018-12404", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-12404", }, { cve: "CVE-2018-12641", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-12641", }, { cve: "CVE-2018-12697", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-12697", }, { cve: "CVE-2018-13259", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-13259", }, { cve: "CVE-2018-13346", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-13346", }, { cve: "CVE-2018-13347", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-13347", }, { cve: "CVE-2018-14046", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-14046", }, { cve: "CVE-2018-14348", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-14348", }, { cve: "CVE-2018-14498", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-14498", }, { cve: "CVE-2018-16062", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-16062", }, { cve: "CVE-2018-16402", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-16402", }, { cve: "CVE-2018-16403", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-16403", }, { cve: "CVE-2018-16548", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-16548", }, { cve: "CVE-2018-16838", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-16838", }, { cve: "CVE-2018-17282", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-17282", }, { cve: "CVE-2018-17336", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-17336", }, { cve: "CVE-2018-17581", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-17581", }, { cve: "CVE-2018-18074", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-18074", }, { cve: "CVE-2018-18310", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-18310", }, { cve: "CVE-2018-18520", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-18520", }, { cve: "CVE-2018-18521", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-18521", }, { cve: "CVE-2018-18584", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-18584", }, { cve: "CVE-2018-18585", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-18585", }, { cve: "CVE-2018-18915", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-18915", }, { cve: "CVE-2018-19044", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-19044", }, { cve: "CVE-2018-19107", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-19107", }, { cve: "CVE-2018-19108", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-19108", }, { cve: "CVE-2018-19198", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-19198", }, { cve: "CVE-2018-19199", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-19199", }, { cve: "CVE-2018-19208", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-19208", }, { cve: "CVE-2018-19535", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-19535", }, { cve: "CVE-2018-19607", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-19607", }, { cve: "CVE-2018-20060", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-20060", }, { cve: "CVE-2018-20096", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-20096", }, { cve: "CVE-2018-20097", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-20097", }, { cve: "CVE-2018-20098", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-20098", }, { cve: "CVE-2018-20099", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-20099", }, { cve: "CVE-2018-20532", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-20532", }, { cve: "CVE-2018-20533", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-20533", }, { cve: "CVE-2018-20534", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-20534", }, { cve: "CVE-2018-3613", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-3613", }, { cve: "CVE-2018-5407", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-5407", }, { cve: "CVE-2018-6541", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-6541", }, { cve: "CVE-2018-7159", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-7159", }, { cve: "CVE-2018-7409", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-7409", }, { cve: "CVE-2018-7485", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-7485", }, { cve: "CVE-2018-7730", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-7730", }, { cve: "CVE-2018-8976", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-8976", }, { cve: "CVE-2018-8977", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-8977", }, { cve: "CVE-2018-9305", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-9305", }, { cve: "CVE-2019-0160", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2019-0160", }, { cve: "CVE-2019-0161", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2019-0161", }, { cve: "CVE-2019-10153", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2019-10153", }, { cve: "CVE-2019-10192", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2019-10192", }, { cve: "CVE-2019-10193", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2019-10193", }, { cve: "CVE-2019-11236", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2019-11236", }, { cve: "CVE-2019-3811", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2019-3811", }, { cve: "CVE-2019-7149", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2019-7149", }, { cve: "CVE-2019-7150", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2019-7150", }, { cve: "CVE-2019-7664", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2019-7664", }, { cve: "CVE-2019-7665", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2019-7665", }, { cve: "CVE-2019-8379", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2019-8379", }, { cve: "CVE-2019-8383", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2019-8383", }, { cve: "CVE-2019-9755", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2019-9755", }, ], }
WID-SEC-W-2022-0517
Vulnerability from csaf_certbund
Published
2019-08-06 22:00
Modified
2024-09-02 22:00
Summary
Red Hat Enterprise Linux: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat Enterprise Linux (RHEL) ist eine populäre Linux-Distribution.
Angriff
Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux ausnutzen, um dadurch die Integrität, Vertraulichkeit und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- Linux
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Red Hat Enterprise Linux (RHEL) ist eine populäre Linux-Distribution.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux ausnutzen, um dadurch die Integrität, Vertraulichkeit und Verfügbarkeit zu gefährden.", title: "Angriff", }, { category: "general", text: "- Linux", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-0517 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2022-0517.json", }, { category: "self", summary: "WID-SEC-2022-0517 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0517", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2332 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2332", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2336 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2336", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2308 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2308", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2285 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2285", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2290 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2290", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2280 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2280", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2283 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2283", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2272 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2272", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2276 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2276", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2258 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2258", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2229 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2229", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2237 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2237", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2196 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2196", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2197 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2197", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2189 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2189", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2177 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2177", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2178 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2178", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2162 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2162", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2157 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2157", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2137 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2137", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2125 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2125", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2126 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2126", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2112 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2112", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2101 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2101", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2075 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2075", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2049 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2049", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2052 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2052", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2047 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2047", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2048 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2048", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2035 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2035", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2037 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2037", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2017 vom 2019-08-06", url: "https://access.redhat.com/errata/RHSA-2019:2017", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:0471 vom 2020-02-11", url: "https://access.redhat.com/errata/RHSA-2020:0471", }, { category: "external", summary: "CentOS Security Advisory CESA-2020:0471 vom 2020-02-11", url: "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2020-0471-Moderate-CentOS-6-spice-gtk-Security-Update-tp4645840.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:2437 vom 2019-08-12", url: "https://access.redhat.com/errata/RHSA-2019:2437", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2019-2285 vom 2019-08-14", url: "http://linux.oracle.com/errata/ELSA-2019-2285.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2019-2052 vom 2019-08-14", url: "http://linux.oracle.com/errata/ELSA-2019-2052.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2019-2258 vom 2019-08-14", url: "http://linux.oracle.com/errata/ELSA-2019-2258.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2019-2178 vom 2019-08-14", url: "http://linux.oracle.com/errata/ELSA-2019-2178.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2019-2229 vom 2019-08-14", url: "http://linux.oracle.com/errata/ELSA-2019-2229.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2019-2177 vom 2019-08-16", url: "http://linux.oracle.com/errata/ELSA-2019-2177.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2019-2283 vom 2019-08-19", url: "http://linux.oracle.com/errata/ELSA-2019-2283.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2019-2189 vom 2019-08-21", url: "http://linux.oracle.com/errata/ELSA-2019-2189.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2019-2280 vom 2019-08-21", url: "http://linux.oracle.com/errata/ELSA-2019-2280.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2019-2332 vom 2019-08-21", url: "http://linux.oracle.com/errata/ELSA-2019-2332.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:2267-1 vom 2019-09-02", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192267-1.html", }, { category: "external", summary: "CentOS Security Advisory CESA-2019:2101 vom 2019-09-18", url: "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-2101-Low-CentOS-7-exiv2-Security-Update-tp4645686.html", }, { category: "external", summary: "CentOS Security Advisory CESA-2019:2258 vom 2019-09-18", url: "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-2258-Moderate-CentOS-7-http-parser-Security-Update-tp4645679.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:2730-1 vom 2019-10-22", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192730-1.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2019:2750-1 vom 2019-10-23", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192750-1.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:3338 vom 2019-11-05", url: "https://access.redhat.com/errata/RHSA-2019:3338", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:3651 vom 2019-11-05", url: "https://access.redhat.com/errata/RHSA-2019:3651", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:3575 vom 2019-11-05", url: "https://access.redhat.com/errata/RHSA-2019:3575", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:3583 vom 2019-11-06", url: "https://access.redhat.com/errata/RHSA-2019:3583", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:3590 vom 2019-11-05", url: "https://access.redhat.com/errata/RHSA-2019:3590", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:3345 vom 2019-11-06", url: "https://access.redhat.com/errata/RHSA-2019:3345", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:3497 vom 2019-11-05", url: "https://access.redhat.com/errata/RHSA-2019:3497", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:3335 vom 2019-11-05", url: "https://access.redhat.com/errata/RHSA-2019:3335", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2019:3705 vom 2019-11-05", url: "https://access.redhat.com/errata/RHSA-2019:3705", }, { category: "external", summary: "AVAYA Security Advisory ASA-2019-209 vom 2019-12-22", url: "https://downloads.avaya.com/css/P8/documents/101060434", }, { category: "external", summary: "AVAYA Security Advisory ASA-2019-205 vom 2019-12-22", url: "https://downloads.avaya.com/css/P8/documents/101060432", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:0595 vom 2020-02-25", url: "https://access.redhat.com/errata/RHSA-2020:0595", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0555-1 vom 2020-03-02", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200555-1.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:0850 vom 2020-03-17", url: "https://access.redhat.com/errata/RHSA-2020:0850", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:0851 vom 2020-03-17", url: "https://access.redhat.com/errata/RHSA-2020:0851", }, { category: "external", summary: "CentOS Security Advisory CESA-2020:0851 vom 2020-03-25", url: "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2020-0851-Moderate-CentOS-7-python-virtualenv-Security-Update-tp4645882.html", }, { category: "external", summary: "CentOS Security Advisory CESA-2020:0850 vom 2020-03-25", url: "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2020-0850-Moderate-CentOS-7-python-pip-Security-Update-tp4645865.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:1265 vom 2020-04-01", url: "https://access.redhat.com/errata/RHSA-2020:1265", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:0921-1 vom 2020-04-04", url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200921-1.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:1471 vom 2020-04-14", url: "https://access.redhat.com/errata/RHSA-2020:1471", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:1464 vom 2020-04-14", url: "https://access.redhat.com/errata/RHSA-2020:1464", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:1461 vom 2020-04-14", url: "https://access.redhat.com/errata/RHSA-2020:1461", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:1577 vom 2020-04-28", url: "https://access.redhat.com/errata/RHSA-2020:1577", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:1916 vom 2020-04-28", url: "https://access.redhat.com/errata/RHSA-2020:1916", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:1605 vom 2020-04-28", url: "https://access.redhat.com/errata/RHSA-2020:1605", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:2068 vom 2020-05-12", url: "https://access.redhat.com/errata/RHSA-2020:2068", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:2081 vom 2020-05-12", url: "https://access.redhat.com/errata/RHSA-2020:2081", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:1792-1 vom 2020-06-26", url: "http://lists.suse.com/pipermail/sle-security-updates/2020-June/007049.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:3194 vom 2020-07-28", url: "https://access.redhat.com/errata/RHSA-2020:3194", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:2711-1 vom 2020-09-22", url: "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007450.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:2942-1 vom 2020-10-16", url: "http://lists.suse.com/pipermail/sle-security-updates/2020-October/007582.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2020:4999 vom 2020-11-10", url: "https://access.redhat.com/errata/RHSA-2020:4999", }, { category: "external", summary: "Debian Security Advisory DLA-2470 vom 2020-12-01", url: "https://lists.debian.org/debian-lts-announce/2020/12/msg00000.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:3842-1 vom 2020-12-16", url: "https://lists.suse.com/pipermail/sle-security-updates/2020-December/008077.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:3841-1 vom 2020-12-16", url: "https://lists.suse.com/pipermail/sle-security-updates/2020-December/008078.html", }, { category: "external", summary: "F5 Security Advisory K00409335 vom 2020-12-29", url: "https://support.f5.com/csp/article/K00409335?utm_source=f5support&utm_medium=RSS", }, { category: "external", summary: "Debian Security Advisory DLA-2645 vom 2021-04-29", url: "https://lists.debian.org/debian-lts-announce/2021/04/msg00032.html", }, { category: "external", summary: "Gentoo Linux Security Advisory GLSA-202107-15 vom 2021-07-08", url: "https://www.cybersecurity-help.cz/vdb/SB2021070803", }, { category: "external", summary: "Debian Security Advisory DLA-2802 vom 2021-10-31", url: "https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:1819-1 vom 2022-05-23", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011137.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:1448-1 vom 2022-04-28", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010858.html", }, { category: "external", summary: "Ubuntu Security Notice USN-5497-1 vom 2022-06-30", url: "https://ubuntu.com/security/notices/USN-5497-1", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2614-1 vom 2022-08-01", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html", }, { category: "external", summary: "Ubuntu Security Notice USN-5553-1 vom 2022-08-08", url: "https://ubuntu.com/security/notices/USN-5553-1", }, { category: "external", summary: "Ubuntu Security Notice USN-5631-1 vom 2022-09-22", url: "https://ubuntu.com/security/notices/USN-5631-1", }, { category: "external", summary: "Ubuntu Security Notice USN-5671-1 vom 2022-10-12", url: "https://ubuntu.com/security/notices/USN-5671-1", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:4252-1 vom 2022-11-28", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-November/013131.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2023-1939 vom 2023-02-22", url: "https://alas.aws.amazon.com/AL2/ALAS-2023-1939.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2023-1940 vom 2023-02-22", url: "https://alas.aws.amazon.com/AL2/ALAS-2023-1940.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2023-6980 vom 2023-11-21", url: "https://linux.oracle.com/errata/ELSA-2023-6980.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2024-12605 vom 2024-09-02", url: "https://linux.oracle.com/errata/ELSA-2024-12605.html", }, ], source_lang: "en-US", title: "Red Hat Enterprise Linux: Mehrere Schwachstellen", tracking: { current_release_date: "2024-09-02T22:00:00.000+00:00", generator: { date: "2024-09-03T08:16:21.549+00:00", engine: { name: "BSI-WID", version: "1.3.6", }, }, id: "WID-SEC-W-2022-0517", initial_release_date: "2019-08-06T22:00:00.000+00:00", revision_history: [ { date: "2019-08-06T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2019-08-12T22:00:00.000+00:00", number: "2", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2019-08-13T22:00:00.000+00:00", number: "3", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2019-08-18T22:00:00.000+00:00", number: "4", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2019-08-19T22:00:00.000+00:00", number: "5", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2019-08-21T22:00:00.000+00:00", number: "6", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2019-09-02T22:00:00.000+00:00", number: "7", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-09-18T22:00:00.000+00:00", number: "8", summary: "Neue Updates von CentOS aufgenommen", }, { date: "2019-10-09T22:00:00.000+00:00", number: "9", summary: "Referenz(en) aufgenommen: SUSE-SU-2019:1487-2", }, { date: "2019-10-15T22:00:00.000+00:00", number: "10", summary: "Referenz(en) aufgenommen: FEDORA-2019-7B06F18A10, FEDORA-2019-A25D5DF3B4, FEDORA-2019-23638D42F3", }, { date: "2019-10-21T22:00:00.000+00:00", number: "11", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-10-23T22:00:00.000+00:00", number: "12", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2019-11-05T23:00:00.000+00:00", number: "13", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2019-12-22T23:00:00.000+00:00", number: "14", summary: "Neue Updates von AVAYA aufgenommen", }, { date: "2020-01-30T23:00:00.000+00:00", number: "15", summary: "Referenz(en) aufgenommen: FEDORA-2020-CB7B7181A0, FEDORA-2020-1DFAA1963B", }, { date: "2020-02-10T23:00:00.000+00:00", number: "16", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-02-11T23:00:00.000+00:00", number: "17", summary: "Neue Updates von CentOS aufgenommen", }, { date: "2020-02-24T23:00:00.000+00:00", number: "18", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-03-02T23:00:00.000+00:00", number: "19", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-03-17T23:00:00.000+00:00", number: "20", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-03-25T23:00:00.000+00:00", number: "21", summary: "Neue Updates von CentOS aufgenommen", }, { date: "2020-03-31T22:00:00.000+00:00", number: "22", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-04-05T22:00:00.000+00:00", number: "23", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-04-14T22:00:00.000+00:00", number: "24", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-04-28T22:00:00.000+00:00", number: "25", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-05-03T22:00:00.000+00:00", number: "26", summary: "Referenz(en) aufgenommen: USN-4349-1", }, { date: "2020-05-12T22:00:00.000+00:00", number: "27", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-06-28T22:00:00.000+00:00", number: "28", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-07-28T22:00:00.000+00:00", number: "29", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-09-22T22:00:00.000+00:00", number: "30", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-10-18T22:00:00.000+00:00", number: "31", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-11-09T23:00:00.000+00:00", number: "32", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2020-11-30T23:00:00.000+00:00", number: "33", summary: "Neue Updates von Debian aufgenommen", }, { date: "2020-12-16T23:00:00.000+00:00", number: "34", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2020-12-28T23:00:00.000+00:00", number: "35", summary: "Neue Updates von F5 aufgenommen", }, { date: "2021-04-29T22:00:00.000+00:00", number: "36", summary: "Neue Updates von Debian aufgenommen", }, { date: "2021-07-07T22:00:00.000+00:00", number: "37", summary: "Neue Updates von Gentoo aufgenommen", }, { date: "2021-09-08T22:00:00.000+00:00", number: "38", summary: "Referenz(en) aufgenommen: USN-5067-1", }, { date: "2021-10-31T23:00:00.000+00:00", number: "39", summary: "Neue Updates von Debian aufgenommen", }, { date: "2022-04-28T22:00:00.000+00:00", number: "40", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-05-23T22:00:00.000+00:00", number: "41", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-06-30T22:00:00.000+00:00", number: "42", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-08-01T22:00:00.000+00:00", number: "43", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-08-08T22:00:00.000+00:00", number: "44", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-09-22T22:00:00.000+00:00", number: "45", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-10-11T22:00:00.000+00:00", number: "46", summary: "Neue Updates von Ubuntu aufgenommen", }, { date: "2022-11-28T23:00:00.000+00:00", number: "47", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2023-02-22T23:00:00.000+00:00", number: "48", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2023-11-21T23:00:00.000+00:00", number: "49", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2024-09-02T22:00:00.000+00:00", number: "50", summary: "Neue Updates von Oracle Linux aufgenommen", }, ], status: "final", version: "50", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "F5 BIG-IP", product: { name: "F5 BIG-IP", product_id: "T001663", product_identification_helper: { cpe: "cpe:/a:f5:big-ip:-", }, }, }, ], category: "vendor", name: "F5", }, { branches: [ { category: "product_name", name: "Gentoo Linux", product: { name: "Gentoo Linux", product_id: "T012167", product_identification_helper: { cpe: "cpe:/o:gentoo:linux:-", }, }, }, ], category: "vendor", name: "Gentoo", }, { branches: [ { category: "product_name", name: "Open Source CentOS", product: { name: "Open Source CentOS", product_id: "1727", product_identification_helper: { cpe: "cpe:/o:centos:centos:-", }, }, }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "Oracle Linux", product: { name: "Oracle Linux", product_id: "T004914", product_identification_helper: { cpe: "cpe:/o:oracle:linux:-", }, }, }, ], category: "vendor", name: "Oracle", }, { branches: [ { branches: [ { category: "product_version", name: "7", product: { name: "Red Hat Enterprise Linux 7", product_id: "T006054", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7", }, }, }, ], category: "product_name", name: "Enterprise Linux", }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2016-3616", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2016-3616", }, { cve: "CVE-2017-15111", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2017-15111", }, { cve: "CVE-2017-15112", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2017-15112", }, { cve: "CVE-2017-17724", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2017-17724", }, { cve: "CVE-2017-18189", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2017-18189", }, { cve: "CVE-2017-18233", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2017-18233", }, { cve: "CVE-2017-18234", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2017-18234", }, { cve: "CVE-2017-18236", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2017-18236", }, { cve: "CVE-2017-18238", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2017-18238", }, { cve: "CVE-2017-5731", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2017-5731", }, { cve: "CVE-2017-5732", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2017-5732", }, { cve: "CVE-2017-5733", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2017-5733", }, { cve: "CVE-2017-5734", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2017-5734", }, { cve: "CVE-2017-5735", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2017-5735", }, { cve: "CVE-2017-6059", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2017-6059", }, { cve: "CVE-2017-6413", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2017-6413", }, { cve: "CVE-2018-0495", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-0495", }, { cve: "CVE-2018-1000132", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-1000132", }, { cve: "CVE-2018-1000852", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-1000852", }, { cve: "CVE-2018-1000876", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-1000876", }, { cve: "CVE-2018-10689", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-10689", }, { cve: "CVE-2018-10772", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-10772", }, { cve: "CVE-2018-10893", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-10893", }, { cve: "CVE-2018-10958", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-10958", }, { cve: "CVE-2018-10998", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-10998", }, { cve: "CVE-2018-11037", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-11037", }, { cve: "CVE-2018-11212", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-11212", }, { cve: "CVE-2018-11213", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-11213", }, { cve: "CVE-2018-11214", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-11214", }, { cve: "CVE-2018-1122", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-1122", }, { cve: "CVE-2018-11813", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-11813", }, { cve: "CVE-2018-12121", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-12121", }, { cve: "CVE-2018-12181", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-12181", }, { cve: "CVE-2018-12264", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-12264", }, { cve: "CVE-2018-12265", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-12265", }, { cve: "CVE-2018-12404", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-12404", }, { cve: "CVE-2018-12641", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-12641", }, { cve: "CVE-2018-12697", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-12697", }, { cve: "CVE-2018-13259", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-13259", }, { cve: "CVE-2018-13346", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-13346", }, { cve: "CVE-2018-13347", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-13347", }, { cve: "CVE-2018-14046", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-14046", }, { cve: "CVE-2018-14348", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-14348", }, { cve: "CVE-2018-14498", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-14498", }, { cve: "CVE-2018-16062", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-16062", }, { cve: "CVE-2018-16402", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-16402", }, { cve: "CVE-2018-16403", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-16403", }, { cve: "CVE-2018-16548", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-16548", }, { cve: "CVE-2018-16838", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-16838", }, { cve: "CVE-2018-17282", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-17282", }, { cve: "CVE-2018-17336", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-17336", }, { cve: "CVE-2018-17581", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-17581", }, { cve: "CVE-2018-18074", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-18074", }, { cve: "CVE-2018-18310", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-18310", }, { cve: "CVE-2018-18520", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-18520", }, { cve: "CVE-2018-18521", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-18521", }, { cve: "CVE-2018-18584", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-18584", }, { cve: "CVE-2018-18585", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-18585", }, { cve: "CVE-2018-18915", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-18915", }, { cve: "CVE-2018-19044", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-19044", }, { cve: "CVE-2018-19107", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-19107", }, { cve: "CVE-2018-19108", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-19108", }, { cve: "CVE-2018-19198", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-19198", }, { cve: "CVE-2018-19199", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-19199", }, { cve: "CVE-2018-19208", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-19208", }, { cve: "CVE-2018-19535", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-19535", }, { cve: "CVE-2018-19607", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-19607", }, { cve: "CVE-2018-20060", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-20060", }, { cve: "CVE-2018-20096", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-20096", }, { cve: "CVE-2018-20097", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-20097", }, { cve: "CVE-2018-20098", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-20098", }, { cve: "CVE-2018-20099", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-20099", }, { cve: "CVE-2018-20532", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-20532", }, { cve: "CVE-2018-20533", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-20533", }, { cve: "CVE-2018-20534", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-20534", }, { cve: "CVE-2018-3613", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-3613", }, { cve: "CVE-2018-5407", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-5407", }, { cve: "CVE-2018-6541", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-6541", }, { cve: "CVE-2018-7159", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-7159", }, { cve: "CVE-2018-7409", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-7409", }, { cve: "CVE-2018-7485", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-7485", }, { cve: "CVE-2018-7730", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-7730", }, { cve: "CVE-2018-8976", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-8976", }, { cve: "CVE-2018-8977", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-8977", }, { cve: "CVE-2018-9305", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2018-9305", }, { cve: "CVE-2019-0160", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2019-0160", }, { cve: "CVE-2019-0161", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2019-0161", }, { cve: "CVE-2019-10153", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2019-10153", }, { cve: "CVE-2019-10192", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2019-10192", }, { cve: "CVE-2019-10193", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2019-10193", }, { cve: "CVE-2019-11236", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2019-11236", }, { cve: "CVE-2019-3811", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2019-3811", }, { cve: "CVE-2019-7149", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2019-7149", }, { cve: "CVE-2019-7150", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2019-7150", }, { cve: "CVE-2019-7664", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2019-7664", }, { cve: "CVE-2019-7665", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2019-7665", }, { cve: "CVE-2019-8379", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2019-8379", }, { cve: "CVE-2019-8383", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2019-8383", }, { cve: "CVE-2019-9755", notes: [ { category: "description", text: "Im Red Hat Enterprise Linux existieren mehrere Schwachstellen in den Komponenten Advancecomp, unixODBC, libguestfs-winsupport, keepalived, libsolv, uriparser, sox, python-urllib3, mercurial, http-parser, spice-gtk, nss, nss-softokn, nss-util, nspr, zziplib, elfutils, procps-ng, redis, sssd, udisks2, blktrace, freerdp, keycloak-httpd-client-install, ovmf, libwpd, mod_auth_openidc, exiv2, binutils, libmspack, libjpeg-turbo, libcgroup, exempi, python-requests, fence-agents und zsh. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung und keine Benutzerinteraktion notwendig. Aufgrund der Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"High\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "T002207", "T000126", "T001663", "398363", "T012167", "1727", "T004914", "T006054", ], }, release_date: "2019-08-06T22:00:00.000+00:00", title: "CVE-2019-9755", }, ], }
ghsa-vr2x-32cg-pm8g
Vulnerability from github
Published
2022-05-13 01:24
Modified
2022-05-13 01:24
Severity ?
Details
FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via RDPClient must connect the rdp server with echo option. This vulnerability appears to have been fixed in after commit 205c612820dac644d665b5bb1cdf437dc5ca01e3.
{ affected: [], aliases: [ "CVE-2018-1000852", ], database_specific: { cwe_ids: [ "CWE-125", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2018-12-20T15:29:00Z", severity: "MODERATE", }, details: "FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via RDPClient must connect the rdp server with echo option. This vulnerability appears to have been fixed in after commit 205c612820dac644d665b5bb1cdf437dc5ca01e3.", id: "GHSA-vr2x-32cg-pm8g", modified: "2022-05-13T01:24:15Z", published: "2022-05-13T01:24:15Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-1000852", }, { type: "WEB", url: "https://github.com/FreeRDP/FreeRDP/issues/4866", }, { type: "WEB", url: "https://github.com/FreeRDP/FreeRDP/pull/4871", }, { type: "WEB", url: "https://github.com/FreeRDP/FreeRDP/pull/4871/commits/baee520e3dd9be6511c45a14c5f5e77784de1471", }, { type: "WEB", url: "https://access.redhat.com/errata/RHSA-2019:2157", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YVJKO2DR5EY4C4QZOP7SNNBEW2JW6FHX", }, { type: "WEB", url: "https://usn.ubuntu.com/4379-1", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", type: "CVSS_V3", }, ], }
gsd-2018-1000852
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via RDPClient must connect the rdp server with echo option. This vulnerability appears to have been fixed in after commit 205c612820dac644d665b5bb1cdf437dc5ca01e3.
Aliases
Aliases
{ GSD: { alias: "CVE-2018-1000852", description: "FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via RDPClient must connect the rdp server with echo option. This vulnerability appears to have been fixed in after commit 205c612820dac644d665b5bb1cdf437dc5ca01e3.", id: "GSD-2018-1000852", references: [ "https://www.suse.com/security/cve/CVE-2018-1000852.html", "https://access.redhat.com/errata/RHSA-2019:2157", "https://ubuntu.com/security/CVE-2018-1000852", "https://linux.oracle.com/cve/CVE-2018-1000852.html", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2018-1000852", ], details: "FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via RDPClient must connect the rdp server with echo option. This vulnerability appears to have been fixed in after commit 205c612820dac644d665b5bb1cdf437dc5ca01e3.", id: "GSD-2018-1000852", modified: "2023-12-13T01:22:27.941850Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", DATE_ASSIGNED: "2018-11-27T14:14:31.672614", DATE_REQUESTED: "2018-11-09T01:21:55", ID: "CVE-2018-1000852", REQUESTER: "tonix0114@gmail.com", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via RDPClient must connect the rdp server with echo option. This vulnerability appears to have been fixed in after commit 205c612820dac644d665b5bb1cdf437dc5ca01e3.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/FreeRDP/FreeRDP/pull/4871/commits/baee520e3dd9be6511c45a14c5f5e77784de1471", refsource: "MISC", url: "https://github.com/FreeRDP/FreeRDP/pull/4871/commits/baee520e3dd9be6511c45a14c5f5e77784de1471", }, { name: "https://github.com/FreeRDP/FreeRDP/issues/4866", refsource: "MISC", url: "https://github.com/FreeRDP/FreeRDP/issues/4866", }, { name: "https://github.com/FreeRDP/FreeRDP/pull/4871", refsource: "MISC", url: "https://github.com/FreeRDP/FreeRDP/pull/4871", }, { name: "FEDORA-2019-b2d986c3e9", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YVJKO2DR5EY4C4QZOP7SNNBEW2JW6FHX/", }, { name: "RHSA-2019:2157", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2019:2157", }, { name: "USN-4379-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4379-1/", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.0.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:freerdp:freerdp:2.0.0:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:freerdp:freerdp:2.0.0:rc0:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:freerdp:freerdp:2.0.0:rc1:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:freerdp:freerdp:2.0.0:rc2:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-1000852", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via RDPClient must connect the rdp server with echo option. This vulnerability appears to have been fixed in after commit 205c612820dac644d665b5bb1cdf437dc5ca01e3.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-125", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/FreeRDP/FreeRDP/pull/4871/commits/baee520e3dd9be6511c45a14c5f5e77784de1471", refsource: "MISC", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/FreeRDP/FreeRDP/pull/4871/commits/baee520e3dd9be6511c45a14c5f5e77784de1471", }, { name: "https://github.com/FreeRDP/FreeRDP/pull/4871", refsource: "MISC", tags: [ "Third Party Advisory", ], url: "https://github.com/FreeRDP/FreeRDP/pull/4871", }, { name: "https://github.com/FreeRDP/FreeRDP/issues/4866", refsource: "MISC", tags: [ "Exploit", "Third Party Advisory", ], url: "https://github.com/FreeRDP/FreeRDP/issues/4866", }, { name: "FEDORA-2019-b2d986c3e9", refsource: "FEDORA", tags: [ "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YVJKO2DR5EY4C4QZOP7SNNBEW2JW6FHX/", }, { name: "RHSA-2019:2157", refsource: "REDHAT", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2019:2157", }, { name: "USN-4379-1", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4379-1/", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.4, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 2.5, }, }, lastModifiedDate: "2020-08-07T17:31Z", publishedDate: "2018-12-20T15:29Z", }, }, }
opensuse-su-2024:10768-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
freerdp-2.4.0-2.1 on GA media
Notes
Title of the patch
freerdp-2.4.0-2.1 on GA media
Description of the patch
These are all security issues fixed in the freerdp-2.4.0-2.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10768
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "freerdp-2.4.0-2.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the freerdp-2.4.0-2.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-10768", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10768-1.json", }, { category: "self", summary: "SUSE CVE CVE-2017-2834 page", url: "https://www.suse.com/security/cve/CVE-2017-2834/", }, { category: "self", summary: "SUSE CVE CVE-2017-2835 page", url: "https://www.suse.com/security/cve/CVE-2017-2835/", }, { category: "self", summary: "SUSE CVE CVE-2017-2836 page", url: "https://www.suse.com/security/cve/CVE-2017-2836/", }, { category: "self", summary: "SUSE CVE CVE-2017-2837 page", url: "https://www.suse.com/security/cve/CVE-2017-2837/", }, { category: "self", summary: "SUSE CVE CVE-2017-2838 page", url: "https://www.suse.com/security/cve/CVE-2017-2838/", }, { category: "self", summary: "SUSE CVE CVE-2017-2839 page", url: "https://www.suse.com/security/cve/CVE-2017-2839/", }, { category: "self", summary: "SUSE CVE CVE-2018-0886 page", url: "https://www.suse.com/security/cve/CVE-2018-0886/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000852 page", url: "https://www.suse.com/security/cve/CVE-2018-1000852/", }, { category: "self", summary: "SUSE CVE CVE-2018-8784 page", url: "https://www.suse.com/security/cve/CVE-2018-8784/", }, { category: "self", summary: "SUSE CVE CVE-2018-8785 page", url: "https://www.suse.com/security/cve/CVE-2018-8785/", }, { category: "self", summary: "SUSE CVE CVE-2018-8786 page", url: "https://www.suse.com/security/cve/CVE-2018-8786/", }, { category: "self", summary: "SUSE CVE CVE-2018-8787 page", url: "https://www.suse.com/security/cve/CVE-2018-8787/", }, { category: "self", summary: "SUSE CVE CVE-2018-8788 page", url: "https://www.suse.com/security/cve/CVE-2018-8788/", }, { category: "self", summary: "SUSE CVE CVE-2018-8789 page", url: "https://www.suse.com/security/cve/CVE-2018-8789/", }, { category: "self", summary: "SUSE CVE CVE-2019-17177 page", url: "https://www.suse.com/security/cve/CVE-2019-17177/", }, { category: "self", summary: "SUSE CVE CVE-2020-11017 page", url: "https://www.suse.com/security/cve/CVE-2020-11017/", }, { category: "self", summary: "SUSE CVE CVE-2020-11018 page", url: "https://www.suse.com/security/cve/CVE-2020-11018/", }, { category: "self", summary: "SUSE CVE CVE-2020-11019 page", url: "https://www.suse.com/security/cve/CVE-2020-11019/", }, { category: "self", summary: "SUSE CVE CVE-2020-11038 page", url: "https://www.suse.com/security/cve/CVE-2020-11038/", }, { category: "self", summary: "SUSE CVE CVE-2020-11039 page", url: "https://www.suse.com/security/cve/CVE-2020-11039/", }, { category: "self", summary: "SUSE CVE CVE-2020-11040 page", url: "https://www.suse.com/security/cve/CVE-2020-11040/", }, { category: "self", summary: "SUSE CVE CVE-2020-11041 page", url: "https://www.suse.com/security/cve/CVE-2020-11041/", }, { category: "self", summary: "SUSE CVE CVE-2020-11043 page", url: "https://www.suse.com/security/cve/CVE-2020-11043/", }, { category: "self", summary: "SUSE CVE CVE-2020-11095 page", url: "https://www.suse.com/security/cve/CVE-2020-11095/", }, { category: "self", summary: "SUSE CVE CVE-2020-11096 page", url: "https://www.suse.com/security/cve/CVE-2020-11096/", }, { category: "self", summary: "SUSE CVE CVE-2020-11097 page", url: "https://www.suse.com/security/cve/CVE-2020-11097/", }, { category: "self", summary: "SUSE CVE CVE-2020-11098 page", url: "https://www.suse.com/security/cve/CVE-2020-11098/", }, { category: "self", summary: "SUSE CVE CVE-2020-11099 page", url: "https://www.suse.com/security/cve/CVE-2020-11099/", }, { category: "self", summary: "SUSE CVE CVE-2020-11521 page", url: "https://www.suse.com/security/cve/CVE-2020-11521/", }, { category: "self", summary: "SUSE CVE CVE-2020-11522 page", url: "https://www.suse.com/security/cve/CVE-2020-11522/", }, { category: "self", summary: "SUSE CVE CVE-2020-11523 page", url: "https://www.suse.com/security/cve/CVE-2020-11523/", }, { category: "self", summary: "SUSE CVE CVE-2020-11524 page", url: "https://www.suse.com/security/cve/CVE-2020-11524/", }, { category: "self", summary: "SUSE CVE CVE-2020-11525 page", url: "https://www.suse.com/security/cve/CVE-2020-11525/", }, { category: "self", summary: "SUSE CVE CVE-2020-11526 page", url: "https://www.suse.com/security/cve/CVE-2020-11526/", }, { category: "self", summary: "SUSE CVE CVE-2020-13396 page", url: "https://www.suse.com/security/cve/CVE-2020-13396/", }, { category: "self", summary: "SUSE CVE CVE-2020-13397 page", url: "https://www.suse.com/security/cve/CVE-2020-13397/", }, { category: "self", summary: "SUSE CVE CVE-2020-13398 page", url: "https://www.suse.com/security/cve/CVE-2020-13398/", }, { category: "self", summary: "SUSE CVE CVE-2020-15103 page", url: "https://www.suse.com/security/cve/CVE-2020-15103/", }, { category: "self", summary: "SUSE CVE CVE-2020-4030 page", url: "https://www.suse.com/security/cve/CVE-2020-4030/", }, { category: "self", summary: "SUSE CVE CVE-2020-4031 page", url: "https://www.suse.com/security/cve/CVE-2020-4031/", }, { category: "self", summary: "SUSE CVE CVE-2020-4032 page", url: "https://www.suse.com/security/cve/CVE-2020-4032/", }, { category: "self", summary: "SUSE CVE CVE-2020-4033 page", url: "https://www.suse.com/security/cve/CVE-2020-4033/", }, ], title: "freerdp-2.4.0-2.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:10768-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "freerdp-2.4.0-2.1.aarch64", product: { name: "freerdp-2.4.0-2.1.aarch64", product_id: "freerdp-2.4.0-2.1.aarch64", }, }, { category: "product_version", name: "freerdp-devel-2.4.0-2.1.aarch64", product: { name: "freerdp-devel-2.4.0-2.1.aarch64", product_id: "freerdp-devel-2.4.0-2.1.aarch64", }, }, { category: "product_version", name: "freerdp-proxy-2.4.0-2.1.aarch64", product: { name: "freerdp-proxy-2.4.0-2.1.aarch64", product_id: "freerdp-proxy-2.4.0-2.1.aarch64", }, }, { category: "product_version", name: "freerdp-server-2.4.0-2.1.aarch64", product: { name: "freerdp-server-2.4.0-2.1.aarch64", product_id: "freerdp-server-2.4.0-2.1.aarch64", }, }, { category: "product_version", name: "freerdp-wayland-2.4.0-2.1.aarch64", product: { name: "freerdp-wayland-2.4.0-2.1.aarch64", product_id: "freerdp-wayland-2.4.0-2.1.aarch64", }, }, { category: "product_version", name: "libfreerdp2-2.4.0-2.1.aarch64", product: { name: "libfreerdp2-2.4.0-2.1.aarch64", product_id: "libfreerdp2-2.4.0-2.1.aarch64", }, }, { category: "product_version", name: "libuwac0-0-2.4.0-2.1.aarch64", product: { name: "libuwac0-0-2.4.0-2.1.aarch64", product_id: "libuwac0-0-2.4.0-2.1.aarch64", }, }, { category: "product_version", name: "libwinpr2-2.4.0-2.1.aarch64", product: { name: "libwinpr2-2.4.0-2.1.aarch64", product_id: "libwinpr2-2.4.0-2.1.aarch64", }, }, { category: "product_version", name: "uwac0-0-devel-2.4.0-2.1.aarch64", product: { name: "uwac0-0-devel-2.4.0-2.1.aarch64", product_id: "uwac0-0-devel-2.4.0-2.1.aarch64", }, }, { category: "product_version", name: "winpr2-devel-2.4.0-2.1.aarch64", product: { name: "winpr2-devel-2.4.0-2.1.aarch64", product_id: "winpr2-devel-2.4.0-2.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "freerdp-2.4.0-2.1.ppc64le", product: { name: "freerdp-2.4.0-2.1.ppc64le", product_id: "freerdp-2.4.0-2.1.ppc64le", }, }, { category: "product_version", name: "freerdp-devel-2.4.0-2.1.ppc64le", product: { name: "freerdp-devel-2.4.0-2.1.ppc64le", product_id: "freerdp-devel-2.4.0-2.1.ppc64le", }, }, { category: "product_version", name: "freerdp-proxy-2.4.0-2.1.ppc64le", product: { name: "freerdp-proxy-2.4.0-2.1.ppc64le", product_id: "freerdp-proxy-2.4.0-2.1.ppc64le", }, }, { category: "product_version", name: "freerdp-server-2.4.0-2.1.ppc64le", product: { name: "freerdp-server-2.4.0-2.1.ppc64le", product_id: "freerdp-server-2.4.0-2.1.ppc64le", }, }, { category: "product_version", name: "freerdp-wayland-2.4.0-2.1.ppc64le", product: { name: "freerdp-wayland-2.4.0-2.1.ppc64le", product_id: "freerdp-wayland-2.4.0-2.1.ppc64le", }, }, { category: "product_version", name: "libfreerdp2-2.4.0-2.1.ppc64le", product: { name: "libfreerdp2-2.4.0-2.1.ppc64le", product_id: "libfreerdp2-2.4.0-2.1.ppc64le", }, }, { category: "product_version", name: "libuwac0-0-2.4.0-2.1.ppc64le", product: { name: "libuwac0-0-2.4.0-2.1.ppc64le", product_id: "libuwac0-0-2.4.0-2.1.ppc64le", }, }, { category: "product_version", name: "libwinpr2-2.4.0-2.1.ppc64le", product: { name: "libwinpr2-2.4.0-2.1.ppc64le", product_id: "libwinpr2-2.4.0-2.1.ppc64le", }, }, { category: "product_version", name: "uwac0-0-devel-2.4.0-2.1.ppc64le", product: { name: "uwac0-0-devel-2.4.0-2.1.ppc64le", product_id: "uwac0-0-devel-2.4.0-2.1.ppc64le", }, }, { category: "product_version", name: "winpr2-devel-2.4.0-2.1.ppc64le", product: { name: "winpr2-devel-2.4.0-2.1.ppc64le", product_id: "winpr2-devel-2.4.0-2.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "freerdp-2.4.0-2.1.s390x", product: { name: "freerdp-2.4.0-2.1.s390x", product_id: "freerdp-2.4.0-2.1.s390x", }, }, { category: "product_version", name: "freerdp-devel-2.4.0-2.1.s390x", product: { name: "freerdp-devel-2.4.0-2.1.s390x", product_id: "freerdp-devel-2.4.0-2.1.s390x", }, }, { category: "product_version", name: "freerdp-proxy-2.4.0-2.1.s390x", product: { name: "freerdp-proxy-2.4.0-2.1.s390x", product_id: "freerdp-proxy-2.4.0-2.1.s390x", }, }, { category: "product_version", name: "freerdp-server-2.4.0-2.1.s390x", product: { name: "freerdp-server-2.4.0-2.1.s390x", product_id: "freerdp-server-2.4.0-2.1.s390x", }, }, { category: "product_version", name: "freerdp-wayland-2.4.0-2.1.s390x", product: { name: "freerdp-wayland-2.4.0-2.1.s390x", product_id: "freerdp-wayland-2.4.0-2.1.s390x", }, }, { category: "product_version", name: "libfreerdp2-2.4.0-2.1.s390x", product: { name: "libfreerdp2-2.4.0-2.1.s390x", product_id: "libfreerdp2-2.4.0-2.1.s390x", }, }, { category: "product_version", name: "libuwac0-0-2.4.0-2.1.s390x", product: { name: "libuwac0-0-2.4.0-2.1.s390x", product_id: "libuwac0-0-2.4.0-2.1.s390x", }, }, { category: "product_version", name: "libwinpr2-2.4.0-2.1.s390x", product: { name: "libwinpr2-2.4.0-2.1.s390x", product_id: "libwinpr2-2.4.0-2.1.s390x", }, }, { category: "product_version", name: "uwac0-0-devel-2.4.0-2.1.s390x", product: { name: "uwac0-0-devel-2.4.0-2.1.s390x", product_id: "uwac0-0-devel-2.4.0-2.1.s390x", }, }, { category: "product_version", name: "winpr2-devel-2.4.0-2.1.s390x", product: { name: "winpr2-devel-2.4.0-2.1.s390x", product_id: "winpr2-devel-2.4.0-2.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "freerdp-2.4.0-2.1.x86_64", product: { name: "freerdp-2.4.0-2.1.x86_64", product_id: "freerdp-2.4.0-2.1.x86_64", }, }, { category: "product_version", name: "freerdp-devel-2.4.0-2.1.x86_64", product: { name: "freerdp-devel-2.4.0-2.1.x86_64", product_id: "freerdp-devel-2.4.0-2.1.x86_64", }, }, { category: "product_version", name: "freerdp-proxy-2.4.0-2.1.x86_64", product: { name: "freerdp-proxy-2.4.0-2.1.x86_64", product_id: "freerdp-proxy-2.4.0-2.1.x86_64", }, }, { category: "product_version", name: "freerdp-server-2.4.0-2.1.x86_64", product: { name: "freerdp-server-2.4.0-2.1.x86_64", product_id: "freerdp-server-2.4.0-2.1.x86_64", }, }, { category: "product_version", name: "freerdp-wayland-2.4.0-2.1.x86_64", product: { name: "freerdp-wayland-2.4.0-2.1.x86_64", product_id: "freerdp-wayland-2.4.0-2.1.x86_64", }, }, { category: "product_version", name: "libfreerdp2-2.4.0-2.1.x86_64", product: { name: "libfreerdp2-2.4.0-2.1.x86_64", product_id: "libfreerdp2-2.4.0-2.1.x86_64", }, }, { category: "product_version", name: "libuwac0-0-2.4.0-2.1.x86_64", product: { name: "libuwac0-0-2.4.0-2.1.x86_64", product_id: "libuwac0-0-2.4.0-2.1.x86_64", }, }, { category: "product_version", name: "libwinpr2-2.4.0-2.1.x86_64", product: { name: "libwinpr2-2.4.0-2.1.x86_64", product_id: "libwinpr2-2.4.0-2.1.x86_64", }, }, { category: "product_version", name: "uwac0-0-devel-2.4.0-2.1.x86_64", product: { name: "uwac0-0-devel-2.4.0-2.1.x86_64", product_id: "uwac0-0-devel-2.4.0-2.1.x86_64", }, }, { category: "product_version", name: "winpr2-devel-2.4.0-2.1.x86_64", product: { name: "winpr2-devel-2.4.0-2.1.x86_64", product_id: "winpr2-devel-2.4.0-2.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "freerdp-2.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", }, product_reference: "freerdp-2.4.0-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "freerdp-2.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", }, product_reference: "freerdp-2.4.0-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "freerdp-2.4.0-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", }, product_reference: "freerdp-2.4.0-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "freerdp-2.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", }, product_reference: "freerdp-2.4.0-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-2.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", }, product_reference: "freerdp-devel-2.4.0-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-2.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", }, product_reference: "freerdp-devel-2.4.0-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-2.4.0-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", }, product_reference: "freerdp-devel-2.4.0-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-2.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", }, product_reference: "freerdp-devel-2.4.0-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "freerdp-proxy-2.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", }, product_reference: "freerdp-proxy-2.4.0-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "freerdp-proxy-2.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", }, product_reference: "freerdp-proxy-2.4.0-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "freerdp-proxy-2.4.0-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", }, product_reference: "freerdp-proxy-2.4.0-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "freerdp-proxy-2.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", }, product_reference: "freerdp-proxy-2.4.0-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "freerdp-server-2.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", }, product_reference: "freerdp-server-2.4.0-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "freerdp-server-2.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", }, product_reference: "freerdp-server-2.4.0-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "freerdp-server-2.4.0-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", }, product_reference: "freerdp-server-2.4.0-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "freerdp-server-2.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", }, product_reference: "freerdp-server-2.4.0-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "freerdp-wayland-2.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", }, product_reference: "freerdp-wayland-2.4.0-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "freerdp-wayland-2.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", }, product_reference: "freerdp-wayland-2.4.0-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "freerdp-wayland-2.4.0-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", }, product_reference: "freerdp-wayland-2.4.0-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "freerdp-wayland-2.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", }, product_reference: "freerdp-wayland-2.4.0-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libfreerdp2-2.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", }, product_reference: "libfreerdp2-2.4.0-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libfreerdp2-2.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", }, product_reference: "libfreerdp2-2.4.0-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libfreerdp2-2.4.0-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", }, product_reference: "libfreerdp2-2.4.0-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libfreerdp2-2.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", }, product_reference: "libfreerdp2-2.4.0-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libuwac0-0-2.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", }, product_reference: "libuwac0-0-2.4.0-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libuwac0-0-2.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", }, product_reference: "libuwac0-0-2.4.0-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libuwac0-0-2.4.0-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", }, product_reference: "libuwac0-0-2.4.0-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libuwac0-0-2.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", }, product_reference: "libuwac0-0-2.4.0-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libwinpr2-2.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", }, product_reference: "libwinpr2-2.4.0-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libwinpr2-2.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", }, product_reference: "libwinpr2-2.4.0-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libwinpr2-2.4.0-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", }, product_reference: "libwinpr2-2.4.0-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libwinpr2-2.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", }, product_reference: "libwinpr2-2.4.0-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "uwac0-0-devel-2.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", }, product_reference: "uwac0-0-devel-2.4.0-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "uwac0-0-devel-2.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", }, product_reference: "uwac0-0-devel-2.4.0-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "uwac0-0-devel-2.4.0-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", }, product_reference: "uwac0-0-devel-2.4.0-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "uwac0-0-devel-2.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", }, product_reference: "uwac0-0-devel-2.4.0-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "winpr2-devel-2.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", }, product_reference: "winpr2-devel-2.4.0-2.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "winpr2-devel-2.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", }, product_reference: "winpr2-devel-2.4.0-2.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "winpr2-devel-2.4.0-2.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", }, product_reference: "winpr2-devel-2.4.0-2.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "winpr2-devel-2.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", }, product_reference: "winpr2-devel-2.4.0-2.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2017-2834", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-2834", }, ], notes: [ { category: "general", text: "An exploitable code execution vulnerability exists in the authentication functionality of FreeRDP 2.0.0-beta1+android11. A specially crafted server response can cause an out-of-bounds write resulting in an exploitable condition. An attacker can compromise the server or use a man in the middle attack to trigger this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-2834", url: "https://www.suse.com/security/cve/CVE-2017-2834", }, { category: "external", summary: "SUSE Bug 1050714 for CVE-2017-2834", url: "https://bugzilla.suse.com/1050714", }, { category: "external", summary: "SUSE Bug 1053919 for CVE-2017-2834", url: "https://bugzilla.suse.com/1053919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-2834", }, { cve: "CVE-2017-2835", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-2835", }, ], notes: [ { category: "general", text: "An exploitable code execution vulnerability exists in the RDP receive functionality of FreeRDP 2.0.0-beta1+android11. A specially crafted server response can cause an out-of-bounds write resulting in an exploitable condition. An attacker can compromise the server or use a man in the middle to trigger this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-2835", url: "https://www.suse.com/security/cve/CVE-2017-2835", }, { category: "external", summary: "SUSE Bug 1050712 for CVE-2017-2835", url: "https://bugzilla.suse.com/1050712", }, { category: "external", summary: "SUSE Bug 1053919 for CVE-2017-2835", url: "https://bugzilla.suse.com/1053919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-2835", }, { cve: "CVE-2017-2836", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-2836", }, ], notes: [ { category: "general", text: "An exploitable denial of service vulnerability exists within the reading of proprietary server certificates in FreeRDP 2.0.0-beta1+android11. A specially crafted challenge packet can cause the program termination leading to a denial of service condition. An attacker can compromise the server or use man in the middle to trigger this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-2836", url: "https://www.suse.com/security/cve/CVE-2017-2836", }, { category: "external", summary: "SUSE Bug 1050699 for CVE-2017-2836", url: "https://bugzilla.suse.com/1050699", }, { category: "external", summary: "SUSE Bug 1053919 for CVE-2017-2836", url: "https://bugzilla.suse.com/1053919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-2836", }, { cve: "CVE-2017-2837", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-2837", }, ], notes: [ { category: "general", text: "An exploitable denial of service vulnerability exists within the handling of security data in FreeRDP 2.0.0-beta1+android11. A specially crafted challenge packet can cause the program termination leading to a denial of service condition. An attacker can compromise the server or use man in the middle to trigger this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-2837", url: "https://www.suse.com/security/cve/CVE-2017-2837", }, { category: "external", summary: "SUSE Bug 1050704 for CVE-2017-2837", url: "https://bugzilla.suse.com/1050704", }, { category: "external", summary: "SUSE Bug 1050708 for CVE-2017-2837", url: "https://bugzilla.suse.com/1050708", }, { category: "external", summary: "SUSE Bug 1053919 for CVE-2017-2837", url: "https://bugzilla.suse.com/1053919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-2837", }, { cve: "CVE-2017-2838", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-2838", }, ], notes: [ { category: "general", text: "An exploitable denial of service vulnerability exists within the handling of challenge packets in FreeRDP 2.0.0-beta1+android11. A specially crafted challenge packet can cause the program termination leading to a denial of service condition. An attacker can compromise the server or use man in the middle to trigger this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-2838", url: "https://www.suse.com/security/cve/CVE-2017-2838", }, { category: "external", summary: "SUSE Bug 1050708 for CVE-2017-2838", url: "https://bugzilla.suse.com/1050708", }, { category: "external", summary: "SUSE Bug 1053919 for CVE-2017-2838", url: "https://bugzilla.suse.com/1053919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-2838", }, { cve: "CVE-2017-2839", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-2839", }, ], notes: [ { category: "general", text: "An exploitable denial of service vulnerability exists within the handling of challenge packets in FreeRDP 2.0.0-beta1+android11. A specially crafted challenge packet can cause the program termination leading to a denial of service condition. An attacker can compromise the server or use man in the middle to trigger this vulnerability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-2839", url: "https://www.suse.com/security/cve/CVE-2017-2839", }, { category: "external", summary: "SUSE Bug 1050711 for CVE-2017-2839", url: "https://bugzilla.suse.com/1050711", }, { category: "external", summary: "SUSE Bug 1053919 for CVE-2017-2839", url: "https://bugzilla.suse.com/1053919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-2839", }, { cve: "CVE-2018-0886", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-0886", }, ], notes: [ { category: "general", text: "The Credential Security Support Provider protocol (CredSSP) in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709 Windows Server 2016 and Windows Server, version 1709 allows a remote code execution vulnerability due to how CredSSP validates request during the authentication process, aka \"CredSSP Remote Code Execution Vulnerability\".", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-0886", url: "https://www.suse.com/security/cve/CVE-2018-0886", }, { category: "external", summary: "SUSE Bug 1085416 for CVE-2018-0886", url: "https://bugzilla.suse.com/1085416", }, { category: "external", summary: "SUSE Bug 1087240 for CVE-2018-0886", url: "https://bugzilla.suse.com/1087240", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-0886", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-0886", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-0886", }, { cve: "CVE-2018-1000852", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000852", }, ], notes: [ { category: "general", text: "FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via RDPClient must connect the rdp server with echo option. This vulnerability appears to have been fixed in after commit 205c612820dac644d665b5bb1cdf437dc5ca01e3.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000852", url: "https://www.suse.com/security/cve/CVE-2018-1000852", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-1000852", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1120507 for CVE-2018-1000852", url: "https://bugzilla.suse.com/1120507", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-1000852", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-1000852", }, { cve: "CVE-2018-8784", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8784", }, ], notes: [ { category: "general", text: "FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress_segment() that results in a memory corruption and probably even a remote code execution.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8784", url: "https://www.suse.com/security/cve/CVE-2018-8784", }, { category: "external", summary: "SUSE Bug 1116708 for CVE-2018-8784", url: "https://bugzilla.suse.com/1116708", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-8784", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-8784", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-8784", }, { cve: "CVE-2018-8785", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8785", }, ], notes: [ { category: "general", text: "FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress() that results in a memory corruption and probably even a remote code execution.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8785", url: "https://www.suse.com/security/cve/CVE-2018-8785", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-8785", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1117967 for CVE-2018-8785", url: "https://bugzilla.suse.com/1117967", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-8785", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-8785", }, { cve: "CVE-2018-8786", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8786", }, ], notes: [ { category: "general", text: "FreeRDP prior to version 2.0.0-rc4 contains an Integer Truncation that leads to a Heap-Based Buffer Overflow in function update_read_bitmap_update() and results in a memory corruption and probably even a remote code execution.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8786", url: "https://www.suse.com/security/cve/CVE-2018-8786", }, { category: "external", summary: "SUSE Bug 1116708 for CVE-2018-8786", url: "https://bugzilla.suse.com/1116708", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-8786", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1117966 for CVE-2018-8786", url: "https://bugzilla.suse.com/1117966", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-8786", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-8786", }, { cve: "CVE-2018-8787", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8787", }, ], notes: [ { category: "general", text: "FreeRDP prior to version 2.0.0-rc4 contains an Integer Overflow that leads to a Heap-Based Buffer Overflow in function gdi_Bitmap_Decompress() and results in a memory corruption and probably even a remote code execution.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8787", url: "https://www.suse.com/security/cve/CVE-2018-8787", }, { category: "external", summary: "SUSE Bug 1116708 for CVE-2018-8787", url: "https://bugzilla.suse.com/1116708", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-8787", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1117964 for CVE-2018-8787", url: "https://bugzilla.suse.com/1117964", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-8787", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-8787", }, { cve: "CVE-2018-8788", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8788", }, ], notes: [ { category: "general", text: "FreeRDP prior to version 2.0.0-rc4 contains an Out-Of-Bounds Write of up to 4 bytes in function nsc_rle_decode() that results in a memory corruption and possibly even a remote code execution.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8788", url: "https://www.suse.com/security/cve/CVE-2018-8788", }, { category: "external", summary: "SUSE Bug 1116708 for CVE-2018-8788", url: "https://bugzilla.suse.com/1116708", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-8788", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-8788", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-8788", }, { cve: "CVE-2018-8789", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8789", }, ], notes: [ { category: "general", text: "FreeRDP prior to version 2.0.0-rc4 contains several Out-Of-Bounds Reads in the NTLM Authentication module that results in a Denial of Service (segfault).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8789", url: "https://www.suse.com/security/cve/CVE-2018-8789", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-8789", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1117965 for CVE-2018-8789", url: "https://bugzilla.suse.com/1117965", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-8789", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-8789", }, { cve: "CVE-2019-17177", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-17177", }, ], notes: [ { category: "general", text: "libfreerdp/codec/region.c in FreeRDP through 1.1.x and 2.x through 2.0.0-rc4 has memory leaks because a supplied realloc pointer (i.e., the first argument to realloc) is also used for a realloc return value.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-17177", url: "https://www.suse.com/security/cve/CVE-2019-17177", }, { category: "external", summary: "SUSE Bug 1153163 for CVE-2019-17177", url: "https://bugzilla.suse.com/1153163", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-17177", }, { cve: "CVE-2020-11017", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11017", }, ], notes: [ { category: "general", text: "In FreeRDP less than or equal to 2.0.0, by providing manipulated input a malicious client can create a double free condition and crash the server. This is fixed in version 2.1.0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-11017", url: "https://www.suse.com/security/cve/CVE-2020-11017", }, { category: "external", summary: "SUSE Bug 1171441 for CVE-2020-11017", url: "https://bugzilla.suse.com/1171441", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-11017", }, { cve: "CVE-2020-11018", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11018", }, ], notes: [ { category: "general", text: "In FreeRDP less than or equal to 2.0.0, a possible resource exhaustion vulnerability can be performed. Malicious clients could trigger out of bound reads causing memory allocation with random size. This has been fixed in 2.1.0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-11018", url: "https://www.suse.com/security/cve/CVE-2020-11018", }, { category: "external", summary: "SUSE Bug 1171441 for CVE-2020-11018", url: "https://bugzilla.suse.com/1171441", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-11018", }, { cve: "CVE-2020-11019", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11019", }, ], notes: [ { category: "general", text: "In FreeRDP less than or equal to 2.0.0, when running with logger set to \"WLOG_TRACE\", a possible crash of application could occur due to a read of an invalid array index. Data could be printed as string to local terminal. This has been fixed in 2.1.0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-11019", url: "https://www.suse.com/security/cve/CVE-2020-11019", }, { category: "external", summary: "SUSE Bug 1171441 for CVE-2020-11019", url: "https://bugzilla.suse.com/1171441", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-11019", }, { cve: "CVE-2020-11038", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11038", }, ], notes: [ { category: "general", text: "In FreeRDP less than or equal to 2.0.0, an Integer Overflow to Buffer Overflow exists. When using /video redirection, a manipulated server can instruct the client to allocate a buffer with a smaller size than requested due to an integer overflow in size calculation. With later messages, the server can manipulate the client to write data out of bound to the previously allocated buffer. This has been patched in 2.1.0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-11038", url: "https://www.suse.com/security/cve/CVE-2020-11038", }, { category: "external", summary: "SUSE Bug 1171441 for CVE-2020-11038", url: "https://bugzilla.suse.com/1171441", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-11038", }, { cve: "CVE-2020-11039", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11039", }, ], notes: [ { category: "general", text: "In FreeRDP less than or equal to 2.0.0, when using a manipulated server with USB redirection enabled (nearly) arbitrary memory can be read and written due to integer overflows in length checks. This has been patched in 2.1.0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-11039", url: "https://www.suse.com/security/cve/CVE-2020-11039", }, { category: "external", summary: "SUSE Bug 1171441 for CVE-2020-11039", url: "https://bugzilla.suse.com/1171441", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-11039", }, { cve: "CVE-2020-11040", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11040", }, ], notes: [ { category: "general", text: "In FreeRDP less than or equal to 2.0.0, there is an out-of-bound data read from memory in clear_decompress_subcode_rlex, visualized on screen as color. This has been patched in 2.1.0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-11040", url: "https://www.suse.com/security/cve/CVE-2020-11040", }, { category: "external", summary: "SUSE Bug 1171441 for CVE-2020-11040", url: "https://bugzilla.suse.com/1171441", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-11040", }, { cve: "CVE-2020-11041", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11041", }, ], notes: [ { category: "general", text: "In FreeRDP less than or equal to 2.0.0, an outside controlled array index is used unchecked for data used as configuration for sound backend (alsa, oss, pulse, ...). The most likely outcome is a crash of the client instance followed by no or distorted sound or a session disconnect. If a user cannot upgrade to the patched version, a workaround is to disable sound for the session. This has been patched in 2.1.0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-11041", url: "https://www.suse.com/security/cve/CVE-2020-11041", }, { category: "external", summary: "SUSE Bug 1171441 for CVE-2020-11041", url: "https://bugzilla.suse.com/1171441", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-11041", }, { cve: "CVE-2020-11043", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11043", }, ], notes: [ { category: "general", text: "In FreeRDP less than or equal to 2.0.0, there is an out-of-bounds read in rfx_process_message_tileset. Invalid data fed to RFX decoder results in garbage on screen (as colors). This has been patched in 2.1.0.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-11043", url: "https://www.suse.com/security/cve/CVE-2020-11043", }, { category: "external", summary: "SUSE Bug 1171441 for CVE-2020-11043", url: "https://bugzilla.suse.com/1171441", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-11043", }, { cve: "CVE-2020-11095", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11095", }, ], notes: [ { category: "general", text: "In FreeRDP before version 2.1.2, an out of bound reads occurs resulting in accessing a memory location that is outside of the boundaries of the static array PRIMARY_DRAWING_ORDER_FIELD_BYTES. This is fixed in version 2.1.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-11095", url: "https://www.suse.com/security/cve/CVE-2020-11095", }, { category: "external", summary: "SUSE Bug 1173247 for CVE-2020-11095", url: "https://bugzilla.suse.com/1173247", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-11095", }, { cve: "CVE-2020-11096", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11096", }, ], notes: [ { category: "general", text: "In FreeRDP before version 2.1.2, there is a global OOB read in update_read_cache_bitmap_v3_order. As a workaround, one can disable bitmap cache with -bitmap-cache (default). This is fixed in version 2.1.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-11096", url: "https://www.suse.com/security/cve/CVE-2020-11096", }, { category: "external", summary: "SUSE Bug 1173247 for CVE-2020-11096", url: "https://bugzilla.suse.com/1173247", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-11096", }, { cve: "CVE-2020-11097", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11097", }, ], notes: [ { category: "general", text: "In FreeRDP before version 2.1.2, an out of bounds read occurs resulting in accessing a memory location that is outside of the boundaries of the static array PRIMARY_DRAWING_ORDER_FIELD_BYTES. This is fixed in version 2.1.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-11097", url: "https://www.suse.com/security/cve/CVE-2020-11097", }, { category: "external", summary: "SUSE Bug 1173247 for CVE-2020-11097", url: "https://bugzilla.suse.com/1173247", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-11097", }, { cve: "CVE-2020-11098", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11098", }, ], notes: [ { category: "general", text: "In FreeRDP before version 2.1.2, there is an out-of-bound read in glyph_cache_put. This affects all FreeRDP clients with `+glyph-cache` option enabled This is fixed in version 2.1.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-11098", url: "https://www.suse.com/security/cve/CVE-2020-11098", }, { category: "external", summary: "SUSE Bug 1173247 for CVE-2020-11098", url: "https://bugzilla.suse.com/1173247", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-11098", }, { cve: "CVE-2020-11099", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11099", }, ], notes: [ { category: "general", text: "In FreeRDP before version 2.1.2, there is an out of bounds read in license_read_new_or_upgrade_license_packet. A manipulated license packet can lead to out of bound reads to an internal buffer. This is fixed in version 2.1.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-11099", url: "https://www.suse.com/security/cve/CVE-2020-11099", }, { category: "external", summary: "SUSE Bug 1173247 for CVE-2020-11099", url: "https://bugzilla.suse.com/1173247", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-11099", }, { cve: "CVE-2020-11521", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11521", }, ], notes: [ { category: "general", text: "libfreerdp/codec/planar.c in FreeRDP version > 1.0 through 2.0.0-rc4 has an Out-of-bounds Write.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-11521", url: "https://www.suse.com/security/cve/CVE-2020-11521", }, { category: "external", summary: "SUSE Bug 1169413 for CVE-2020-11521", url: "https://bugzilla.suse.com/1169413", }, { category: "external", summary: "SUSE Bug 1171443 for CVE-2020-11521", url: "https://bugzilla.suse.com/1171443", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-11521", }, { cve: "CVE-2020-11522", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11522", }, ], notes: [ { category: "general", text: "libfreerdp/gdi/gdi.c in FreeRDP > 1.0 through 2.0.0-rc4 has an Out-of-bounds Read.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-11522", url: "https://www.suse.com/security/cve/CVE-2020-11522", }, { category: "external", summary: "SUSE Bug 1169413 for CVE-2020-11522", url: "https://bugzilla.suse.com/1169413", }, { category: "external", summary: "SUSE Bug 1171444 for CVE-2020-11522", url: "https://bugzilla.suse.com/1171444", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-11522", }, { cve: "CVE-2020-11523", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11523", }, ], notes: [ { category: "general", text: "libfreerdp/gdi/region.c in FreeRDP versions > 1.0 through 2.0.0-rc4 has an Integer Overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-11523", url: "https://www.suse.com/security/cve/CVE-2020-11523", }, { category: "external", summary: "SUSE Bug 1169413 for CVE-2020-11523", url: "https://bugzilla.suse.com/1169413", }, { category: "external", summary: "SUSE Bug 1171445 for CVE-2020-11523", url: "https://bugzilla.suse.com/1171445", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-11523", }, { cve: "CVE-2020-11524", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11524", }, ], notes: [ { category: "general", text: "libfreerdp/codec/interleaved.c in FreeRDP versions > 1.0 through 2.0.0-rc4 has an Out-of-bounds Write.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-11524", url: "https://www.suse.com/security/cve/CVE-2020-11524", }, { category: "external", summary: "SUSE Bug 1169413 for CVE-2020-11524", url: "https://bugzilla.suse.com/1169413", }, { category: "external", summary: "SUSE Bug 1171446 for CVE-2020-11524", url: "https://bugzilla.suse.com/1171446", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-11524", }, { cve: "CVE-2020-11525", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11525", }, ], notes: [ { category: "general", text: "libfreerdp/cache/bitmap.c in FreeRDP versions > 1.0 through 2.0.0-rc4 has an Out of bounds read.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-11525", url: "https://www.suse.com/security/cve/CVE-2020-11525", }, { category: "external", summary: "SUSE Bug 1169413 for CVE-2020-11525", url: "https://bugzilla.suse.com/1169413", }, { category: "external", summary: "SUSE Bug 1171447 for CVE-2020-11525", url: "https://bugzilla.suse.com/1171447", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2020-11525", }, { cve: "CVE-2020-11526", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11526", }, ], notes: [ { category: "general", text: "libfreerdp/core/update.c in FreeRDP versions > 1.1 through 2.0.0-rc4 has an Out-of-bounds Read.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-11526", url: "https://www.suse.com/security/cve/CVE-2020-11526", }, { category: "external", summary: "SUSE Bug 1169413 for CVE-2020-11526", url: "https://bugzilla.suse.com/1169413", }, { category: "external", summary: "SUSE Bug 1171674 for CVE-2020-11526", url: "https://bugzilla.suse.com/1171674", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2020-11526", }, { cve: "CVE-2020-13396", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-13396", }, ], notes: [ { category: "general", text: "An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB) read vulnerability has been detected in ntlm_read_ChallengeMessage in winpr/libwinpr/sspi/NTLM/ntlm_message.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-13396", url: "https://www.suse.com/security/cve/CVE-2020-13396", }, { category: "external", summary: "SUSE Bug 1171441 for CVE-2020-13396", url: "https://bugzilla.suse.com/1171441", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-13396", }, { cve: "CVE-2020-13397", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-13397", }, ], notes: [ { category: "general", text: "An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB) read vulnerability has been detected in security_fips_decrypt in libfreerdp/core/security.c due to an uninitialized value.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-13397", url: "https://www.suse.com/security/cve/CVE-2020-13397", }, { category: "external", summary: "SUSE Bug 1171441 for CVE-2020-13397", url: "https://bugzilla.suse.com/1171441", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-13397", }, { cve: "CVE-2020-13398", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-13398", }, ], notes: [ { category: "general", text: "An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB) write vulnerability has been detected in crypto_rsa_common in libfreerdp/crypto/crypto.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-13398", url: "https://www.suse.com/security/cve/CVE-2020-13398", }, { category: "external", summary: "SUSE Bug 1171441 for CVE-2020-13398", url: "https://bugzilla.suse.com/1171441", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-13398", }, { cve: "CVE-2020-15103", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-15103", }, ], notes: [ { category: "general", text: "In FreeRDP less than or equal to 2.1.2, an integer overflow exists due to missing input sanitation in rdpegfx channel. All FreeRDP clients are affected. The input rectangles from the server are not checked against local surface coordinates and blindly accepted. A malicious server can send data that will crash the client later on (invalid length arguments to a `memcpy`) This has been fixed in 2.2.0. As a workaround, stop using command line arguments /gfx, /gfx-h264 and /network:auto", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-15103", url: "https://www.suse.com/security/cve/CVE-2020-15103", }, { category: "external", summary: "SUSE Bug 1174321 for CVE-2020-15103", url: "https://bugzilla.suse.com/1174321", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-15103", }, { cve: "CVE-2020-4030", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-4030", }, ], notes: [ { category: "general", text: "In FreeRDP before version 2.1.2, there is an out of bounds read in TrioParse. Logging might bypass string length checks due to an integer overflow. This is fixed in version 2.1.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-4030", url: "https://www.suse.com/security/cve/CVE-2020-4030", }, { category: "external", summary: "SUSE Bug 1173247 for CVE-2020-4030", url: "https://bugzilla.suse.com/1173247", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-4030", }, { cve: "CVE-2020-4031", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-4031", }, ], notes: [ { category: "general", text: "In FreeRDP before version 2.1.2, there is a use-after-free in gdi_SelectObject. All FreeRDP clients using compatibility mode with /relax-order-checks are affected. This is fixed in version 2.1.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-4031", url: "https://www.suse.com/security/cve/CVE-2020-4031", }, { category: "external", summary: "SUSE Bug 1173247 for CVE-2020-4031", url: "https://bugzilla.suse.com/1173247", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-4031", }, { cve: "CVE-2020-4032", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-4032", }, ], notes: [ { category: "general", text: "In FreeRDP before version 2.1.2, there is an integer casting vulnerability in update_recv_secondary_order. All clients with +glyph-cache /relax-order-checks are affected. This is fixed in version 2.1.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-4032", url: "https://www.suse.com/security/cve/CVE-2020-4032", }, { category: "external", summary: "SUSE Bug 1173247 for CVE-2020-4032", url: "https://bugzilla.suse.com/1173247", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-4032", }, { cve: "CVE-2020-4033", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-4033", }, ], notes: [ { category: "general", text: "In FreeRDP before version 2.1.2, there is an out of bounds read in RLEDECOMPRESS. All FreeRDP based clients with sessions with color depth < 32 are affected. This is fixed in version 2.1.2.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-4033", url: "https://www.suse.com/security/cve/CVE-2020-4033", }, { category: "external", summary: "SUSE Bug 1173247 for CVE-2020-4033", url: "https://bugzilla.suse.com/1173247", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:freerdp-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-proxy-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-server-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.s390x", "openSUSE Tumbleweed:freerdp-wayland-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libfreerdp2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libuwac0-0-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.s390x", "openSUSE Tumbleweed:libwinpr2-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:uwac0-0-devel-2.4.0-2.1.x86_64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.aarch64", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.ppc64le", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.s390x", "openSUSE Tumbleweed:winpr2-devel-2.4.0-2.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-4033", }, ], }
opensuse-su-2019:0325-1
Vulnerability from csaf_opensuse
Published
2019-03-23 11:14
Modified
2019-03-23 11:14
Summary
Security update for freerdp
Notes
Title of the patch
Security update for freerdp
Description of the patch
This update for freerdp to version 2.0.0~rc4 fixes the following issues:
Security issues fixed:
- CVE-2018-0886: Fix a remote code execution vulnerability (CredSSP) (bsc#1085416, bsc#1087240, bsc#1104918)
- CVE-2018-8789: Fix several denial of service vulnerabilities in the in the NTLM Authentication module (bsc#1117965)
- CVE-2018-8785: Fix a potential remote code execution vulnerability in the zgfx_decompress function (bsc#1117967)
- CVE-2018-8786: Fix a potential remote code execution vulnerability in the update_read_bitmap_update function (bsc#1117966)
- CVE-2018-8787: Fix a potential remote code execution vulnerability in the gdi_Bitmap_Decompress function (bsc#1117964)
- CVE-2018-8788: Fix a potential remote code execution vulnerability in the nsc_rle_decode function (bsc#1117963)
- CVE-2018-8784: Fix a potential remote code execution vulnerability in the zgfx_decompress_segment function (bsc#1116708)
- CVE-2018-1000852: Fixed a remote memory access in the drdynvc_process_capability_request function (bsc#1120507)
Other issues:
- Upgraded to version 2.0.0-rc4 (FATE#326739)
- Security and stability improvements, including bsc#1103557 and bsc#1112028
- gateway: multiple fixes and improvements
- client/X11: support for rail (remote app) icons was added
- The licensing code was re-worked: Per-device licenses are now saved on the
client and used on re-connect:
WARNING: this is a change in FreeRDP behavior regarding licensing. If the old
behavior is required, or no licenses should be saved use the
new command line option +old-license (gh#/FreeRDP/FreeRDP#4979)
- Improved order handling - only orders that were enable during capability exchange are accepted.
WARNING and NOTE: some servers do improperly send orders that weren't negotiated,
for such cases the new command line option /relax-order-checks was added to
disable the strict order checking. If connecting to xrdp the options
/relax-order-checks *and* +glyph-cache are required. (gh#/FreeRDP/FreeRDP#4926)
- Fixed automount issues
- Fixed several audio and microphone related issues
- Fixed X11 Right-Ctrl ungrab feature
- Fixed race condition in rdpsnd channel server.
- Disabled SSE2 for ARM and powerpc
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames
openSUSE-2019-325
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for freerdp", title: "Title of the patch", }, { category: "description", text: "This update for freerdp to version 2.0.0~rc4 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2018-0886: Fix a remote code execution vulnerability (CredSSP) (bsc#1085416, bsc#1087240, bsc#1104918)\n- CVE-2018-8789: Fix several denial of service vulnerabilities in the in the NTLM Authentication module (bsc#1117965)\n- CVE-2018-8785: Fix a potential remote code execution vulnerability in the zgfx_decompress function (bsc#1117967)\n- CVE-2018-8786: Fix a potential remote code execution vulnerability in the update_read_bitmap_update function (bsc#1117966)\n- CVE-2018-8787: Fix a potential remote code execution vulnerability in the gdi_Bitmap_Decompress function (bsc#1117964)\n- CVE-2018-8788: Fix a potential remote code execution vulnerability in the nsc_rle_decode function (bsc#1117963)\n- CVE-2018-8784: Fix a potential remote code execution vulnerability in the zgfx_decompress_segment function (bsc#1116708)\n- CVE-2018-1000852: Fixed a remote memory access in the drdynvc_process_capability_request function (bsc#1120507)\n\nOther issues:\n\n- Upgraded to version 2.0.0-rc4 (FATE#326739)\n- Security and stability improvements, including bsc#1103557 and bsc#1112028\n- gateway: multiple fixes and improvements\n- client/X11: support for rail (remote app) icons was added\n- The licensing code was re-worked: Per-device licenses are now saved on the\n client and used on re-connect: \n WARNING: this is a change in FreeRDP behavior regarding licensing. If the old\n behavior is required, or no licenses should be saved use the\n new command line option +old-license (gh#/FreeRDP/FreeRDP#4979)\n- Improved order handling - only orders that were enable during capability exchange are accepted.\n WARNING and NOTE: some servers do improperly send orders that weren't negotiated,\n for such cases the new command line option /relax-order-checks was added to\n disable the strict order checking. If connecting to xrdp the options\n /relax-order-checks *and* +glyph-cache are required. (gh#/FreeRDP/FreeRDP#4926)\n- Fixed automount issues\n- Fixed several audio and microphone related issues\n- Fixed X11 Right-Ctrl ungrab feature\n- Fixed race condition in rdpsnd channel server.\n- Disabled SSE2 for ARM and powerpc\n\nThis update was imported from the SUSE:SLE-15:Update update project.", title: "Description of the patch", }, { category: "details", text: "openSUSE-2019-325", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_0325-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2019:0325-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MIETP2PR4Q4SATLCVO5M3PMEMOFCHU4C/#MIETP2PR4Q4SATLCVO5M3PMEMOFCHU4C", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2019:0325-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MIETP2PR4Q4SATLCVO5M3PMEMOFCHU4C/#MIETP2PR4Q4SATLCVO5M3PMEMOFCHU4C", }, { category: "self", summary: "SUSE Bug 1085416", url: "https://bugzilla.suse.com/1085416", }, { category: "self", summary: "SUSE Bug 1087240", url: "https://bugzilla.suse.com/1087240", }, { category: "self", summary: "SUSE Bug 1103557", url: "https://bugzilla.suse.com/1103557", }, { category: "self", summary: "SUSE Bug 1104918", url: "https://bugzilla.suse.com/1104918", }, { category: "self", summary: "SUSE Bug 1112028", url: "https://bugzilla.suse.com/1112028", }, { category: "self", summary: "SUSE Bug 1116708", url: "https://bugzilla.suse.com/1116708", }, { category: "self", summary: "SUSE Bug 1117963", url: "https://bugzilla.suse.com/1117963", }, { category: "self", summary: "SUSE Bug 1117964", url: "https://bugzilla.suse.com/1117964", }, { category: "self", summary: "SUSE Bug 1117965", url: "https://bugzilla.suse.com/1117965", }, { category: "self", summary: "SUSE Bug 1117966", url: "https://bugzilla.suse.com/1117966", }, { category: "self", summary: "SUSE Bug 1117967", url: "https://bugzilla.suse.com/1117967", }, { category: "self", summary: "SUSE Bug 1120507", url: "https://bugzilla.suse.com/1120507", }, { category: "self", summary: "SUSE CVE CVE-2018-0886 page", url: "https://www.suse.com/security/cve/CVE-2018-0886/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000852 page", url: "https://www.suse.com/security/cve/CVE-2018-1000852/", }, { category: "self", summary: "SUSE CVE CVE-2018-8784 page", url: "https://www.suse.com/security/cve/CVE-2018-8784/", }, { category: "self", summary: "SUSE CVE CVE-2018-8785 page", url: "https://www.suse.com/security/cve/CVE-2018-8785/", }, { category: "self", summary: "SUSE CVE CVE-2018-8786 page", url: "https://www.suse.com/security/cve/CVE-2018-8786/", }, { category: "self", summary: "SUSE CVE CVE-2018-8787 page", url: "https://www.suse.com/security/cve/CVE-2018-8787/", }, { category: "self", summary: "SUSE CVE CVE-2018-8788 page", url: "https://www.suse.com/security/cve/CVE-2018-8788/", }, { category: "self", summary: "SUSE CVE CVE-2018-8789 page", url: "https://www.suse.com/security/cve/CVE-2018-8789/", }, ], title: "Security update for freerdp", tracking: { current_release_date: "2019-03-23T11:14:11Z", generator: { date: "2019-03-23T11:14:11Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2019:0325-1", initial_release_date: "2019-03-23T11:14:11Z", revision_history: [ { date: "2019-03-23T11:14:11Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "freerdp-2.0.0~rc4-lp150.2.3.1.x86_64", product: { name: "freerdp-2.0.0~rc4-lp150.2.3.1.x86_64", product_id: "freerdp-2.0.0~rc4-lp150.2.3.1.x86_64", }, }, { category: "product_version", name: "freerdp-devel-2.0.0~rc4-lp150.2.3.1.x86_64", product: { name: "freerdp-devel-2.0.0~rc4-lp150.2.3.1.x86_64", product_id: "freerdp-devel-2.0.0~rc4-lp150.2.3.1.x86_64", }, }, { category: "product_version", name: "freerdp-server-2.0.0~rc4-lp150.2.3.1.x86_64", product: { name: "freerdp-server-2.0.0~rc4-lp150.2.3.1.x86_64", product_id: "freerdp-server-2.0.0~rc4-lp150.2.3.1.x86_64", }, }, { category: "product_version", name: "freerdp-wayland-2.0.0~rc4-lp150.2.3.1.x86_64", product: { name: "freerdp-wayland-2.0.0~rc4-lp150.2.3.1.x86_64", product_id: "freerdp-wayland-2.0.0~rc4-lp150.2.3.1.x86_64", }, }, { category: "product_version", name: "libfreerdp2-2.0.0~rc4-lp150.2.3.1.x86_64", product: { name: "libfreerdp2-2.0.0~rc4-lp150.2.3.1.x86_64", product_id: "libfreerdp2-2.0.0~rc4-lp150.2.3.1.x86_64", }, }, { category: "product_version", name: "libuwac0-0-2.0.0~rc4-lp150.2.3.1.x86_64", product: { name: "libuwac0-0-2.0.0~rc4-lp150.2.3.1.x86_64", product_id: "libuwac0-0-2.0.0~rc4-lp150.2.3.1.x86_64", }, }, { category: "product_version", name: "libwinpr2-2.0.0~rc4-lp150.2.3.1.x86_64", product: { name: "libwinpr2-2.0.0~rc4-lp150.2.3.1.x86_64", product_id: "libwinpr2-2.0.0~rc4-lp150.2.3.1.x86_64", }, }, { category: "product_version", name: "uwac0-0-devel-2.0.0~rc4-lp150.2.3.1.x86_64", product: { name: "uwac0-0-devel-2.0.0~rc4-lp150.2.3.1.x86_64", product_id: "uwac0-0-devel-2.0.0~rc4-lp150.2.3.1.x86_64", }, }, { category: "product_version", name: "winpr2-devel-2.0.0~rc4-lp150.2.3.1.x86_64", product: { name: "winpr2-devel-2.0.0~rc4-lp150.2.3.1.x86_64", product_id: "winpr2-devel-2.0.0~rc4-lp150.2.3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.0", product: { name: "openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.0", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "freerdp-2.0.0~rc4-lp150.2.3.1.x86_64 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:freerdp-2.0.0~rc4-lp150.2.3.1.x86_64", }, product_reference: "freerdp-2.0.0~rc4-lp150.2.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "freerdp-devel-2.0.0~rc4-lp150.2.3.1.x86_64 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:freerdp-devel-2.0.0~rc4-lp150.2.3.1.x86_64", }, product_reference: "freerdp-devel-2.0.0~rc4-lp150.2.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "freerdp-server-2.0.0~rc4-lp150.2.3.1.x86_64 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:freerdp-server-2.0.0~rc4-lp150.2.3.1.x86_64", }, product_reference: "freerdp-server-2.0.0~rc4-lp150.2.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "freerdp-wayland-2.0.0~rc4-lp150.2.3.1.x86_64 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:freerdp-wayland-2.0.0~rc4-lp150.2.3.1.x86_64", }, product_reference: "freerdp-wayland-2.0.0~rc4-lp150.2.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "libfreerdp2-2.0.0~rc4-lp150.2.3.1.x86_64 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:libfreerdp2-2.0.0~rc4-lp150.2.3.1.x86_64", }, product_reference: "libfreerdp2-2.0.0~rc4-lp150.2.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "libuwac0-0-2.0.0~rc4-lp150.2.3.1.x86_64 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:libuwac0-0-2.0.0~rc4-lp150.2.3.1.x86_64", }, product_reference: "libuwac0-0-2.0.0~rc4-lp150.2.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "libwinpr2-2.0.0~rc4-lp150.2.3.1.x86_64 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:libwinpr2-2.0.0~rc4-lp150.2.3.1.x86_64", }, product_reference: "libwinpr2-2.0.0~rc4-lp150.2.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "uwac0-0-devel-2.0.0~rc4-lp150.2.3.1.x86_64 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:uwac0-0-devel-2.0.0~rc4-lp150.2.3.1.x86_64", }, product_reference: "uwac0-0-devel-2.0.0~rc4-lp150.2.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.0", }, { category: "default_component_of", full_product_name: { name: "winpr2-devel-2.0.0~rc4-lp150.2.3.1.x86_64 as component of openSUSE Leap 15.0", product_id: "openSUSE Leap 15.0:winpr2-devel-2.0.0~rc4-lp150.2.3.1.x86_64", }, product_reference: "winpr2-devel-2.0.0~rc4-lp150.2.3.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.0", }, ], }, vulnerabilities: [ { cve: "CVE-2018-0886", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-0886", }, ], notes: [ { category: "general", text: "The Credential Security Support Provider protocol (CredSSP) in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709 Windows Server 2016 and Windows Server, version 1709 allows a remote code execution vulnerability due to how CredSSP validates request during the authentication process, aka \"CredSSP Remote Code Execution Vulnerability\".", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:freerdp-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-server-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-wayland-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libfreerdp2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libuwac0-0-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libwinpr2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:uwac0-0-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:winpr2-devel-2.0.0~rc4-lp150.2.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-0886", url: "https://www.suse.com/security/cve/CVE-2018-0886", }, { category: "external", summary: "SUSE Bug 1085416 for CVE-2018-0886", url: "https://bugzilla.suse.com/1085416", }, { category: "external", summary: "SUSE Bug 1087240 for CVE-2018-0886", url: "https://bugzilla.suse.com/1087240", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-0886", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-0886", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:freerdp-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-server-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-wayland-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libfreerdp2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libuwac0-0-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libwinpr2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:uwac0-0-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:winpr2-devel-2.0.0~rc4-lp150.2.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.0:freerdp-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-server-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-wayland-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libfreerdp2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libuwac0-0-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libwinpr2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:uwac0-0-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:winpr2-devel-2.0.0~rc4-lp150.2.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-03-23T11:14:11Z", details: "important", }, ], title: "CVE-2018-0886", }, { cve: "CVE-2018-1000852", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000852", }, ], notes: [ { category: "general", text: "FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via RDPClient must connect the rdp server with echo option. This vulnerability appears to have been fixed in after commit 205c612820dac644d665b5bb1cdf437dc5ca01e3.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:freerdp-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-server-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-wayland-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libfreerdp2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libuwac0-0-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libwinpr2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:uwac0-0-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:winpr2-devel-2.0.0~rc4-lp150.2.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000852", url: "https://www.suse.com/security/cve/CVE-2018-1000852", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-1000852", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1120507 for CVE-2018-1000852", url: "https://bugzilla.suse.com/1120507", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-1000852", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:freerdp-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-server-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-wayland-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libfreerdp2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libuwac0-0-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libwinpr2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:uwac0-0-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:winpr2-devel-2.0.0~rc4-lp150.2.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Leap 15.0:freerdp-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-server-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-wayland-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libfreerdp2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libuwac0-0-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libwinpr2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:uwac0-0-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:winpr2-devel-2.0.0~rc4-lp150.2.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-03-23T11:14:11Z", details: "moderate", }, ], title: "CVE-2018-1000852", }, { cve: "CVE-2018-8784", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8784", }, ], notes: [ { category: "general", text: "FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress_segment() that results in a memory corruption and probably even a remote code execution.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:freerdp-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-server-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-wayland-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libfreerdp2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libuwac0-0-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libwinpr2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:uwac0-0-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:winpr2-devel-2.0.0~rc4-lp150.2.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8784", url: "https://www.suse.com/security/cve/CVE-2018-8784", }, { category: "external", summary: "SUSE Bug 1116708 for CVE-2018-8784", url: "https://bugzilla.suse.com/1116708", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-8784", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-8784", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:freerdp-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-server-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-wayland-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libfreerdp2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libuwac0-0-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libwinpr2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:uwac0-0-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:winpr2-devel-2.0.0~rc4-lp150.2.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.0:freerdp-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-server-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-wayland-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libfreerdp2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libuwac0-0-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libwinpr2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:uwac0-0-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:winpr2-devel-2.0.0~rc4-lp150.2.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-03-23T11:14:11Z", details: "important", }, ], title: "CVE-2018-8784", }, { cve: "CVE-2018-8785", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8785", }, ], notes: [ { category: "general", text: "FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress() that results in a memory corruption and probably even a remote code execution.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:freerdp-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-server-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-wayland-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libfreerdp2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libuwac0-0-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libwinpr2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:uwac0-0-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:winpr2-devel-2.0.0~rc4-lp150.2.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8785", url: "https://www.suse.com/security/cve/CVE-2018-8785", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-8785", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1117967 for CVE-2018-8785", url: "https://bugzilla.suse.com/1117967", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-8785", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:freerdp-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-server-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-wayland-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libfreerdp2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libuwac0-0-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libwinpr2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:uwac0-0-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:winpr2-devel-2.0.0~rc4-lp150.2.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.0:freerdp-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-server-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-wayland-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libfreerdp2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libuwac0-0-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libwinpr2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:uwac0-0-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:winpr2-devel-2.0.0~rc4-lp150.2.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-03-23T11:14:11Z", details: "important", }, ], title: "CVE-2018-8785", }, { cve: "CVE-2018-8786", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8786", }, ], notes: [ { category: "general", text: "FreeRDP prior to version 2.0.0-rc4 contains an Integer Truncation that leads to a Heap-Based Buffer Overflow in function update_read_bitmap_update() and results in a memory corruption and probably even a remote code execution.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:freerdp-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-server-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-wayland-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libfreerdp2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libuwac0-0-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libwinpr2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:uwac0-0-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:winpr2-devel-2.0.0~rc4-lp150.2.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8786", url: "https://www.suse.com/security/cve/CVE-2018-8786", }, { category: "external", summary: "SUSE Bug 1116708 for CVE-2018-8786", url: "https://bugzilla.suse.com/1116708", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-8786", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1117966 for CVE-2018-8786", url: "https://bugzilla.suse.com/1117966", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-8786", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:freerdp-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-server-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-wayland-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libfreerdp2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libuwac0-0-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libwinpr2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:uwac0-0-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:winpr2-devel-2.0.0~rc4-lp150.2.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.0:freerdp-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-server-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-wayland-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libfreerdp2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libuwac0-0-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libwinpr2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:uwac0-0-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:winpr2-devel-2.0.0~rc4-lp150.2.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-03-23T11:14:11Z", details: "important", }, ], title: "CVE-2018-8786", }, { cve: "CVE-2018-8787", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8787", }, ], notes: [ { category: "general", text: "FreeRDP prior to version 2.0.0-rc4 contains an Integer Overflow that leads to a Heap-Based Buffer Overflow in function gdi_Bitmap_Decompress() and results in a memory corruption and probably even a remote code execution.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:freerdp-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-server-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-wayland-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libfreerdp2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libuwac0-0-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libwinpr2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:uwac0-0-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:winpr2-devel-2.0.0~rc4-lp150.2.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8787", url: "https://www.suse.com/security/cve/CVE-2018-8787", }, { category: "external", summary: "SUSE Bug 1116708 for CVE-2018-8787", url: "https://bugzilla.suse.com/1116708", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-8787", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1117964 for CVE-2018-8787", url: "https://bugzilla.suse.com/1117964", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-8787", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:freerdp-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-server-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-wayland-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libfreerdp2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libuwac0-0-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libwinpr2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:uwac0-0-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:winpr2-devel-2.0.0~rc4-lp150.2.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.0:freerdp-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-server-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-wayland-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libfreerdp2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libuwac0-0-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libwinpr2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:uwac0-0-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:winpr2-devel-2.0.0~rc4-lp150.2.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-03-23T11:14:11Z", details: "important", }, ], title: "CVE-2018-8787", }, { cve: "CVE-2018-8788", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8788", }, ], notes: [ { category: "general", text: "FreeRDP prior to version 2.0.0-rc4 contains an Out-Of-Bounds Write of up to 4 bytes in function nsc_rle_decode() that results in a memory corruption and possibly even a remote code execution.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:freerdp-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-server-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-wayland-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libfreerdp2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libuwac0-0-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libwinpr2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:uwac0-0-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:winpr2-devel-2.0.0~rc4-lp150.2.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8788", url: "https://www.suse.com/security/cve/CVE-2018-8788", }, { category: "external", summary: "SUSE Bug 1116708 for CVE-2018-8788", url: "https://bugzilla.suse.com/1116708", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-8788", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-8788", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:freerdp-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-server-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-wayland-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libfreerdp2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libuwac0-0-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libwinpr2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:uwac0-0-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:winpr2-devel-2.0.0~rc4-lp150.2.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.0:freerdp-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-server-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-wayland-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libfreerdp2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libuwac0-0-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libwinpr2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:uwac0-0-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:winpr2-devel-2.0.0~rc4-lp150.2.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-03-23T11:14:11Z", details: "important", }, ], title: "CVE-2018-8788", }, { cve: "CVE-2018-8789", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-8789", }, ], notes: [ { category: "general", text: "FreeRDP prior to version 2.0.0-rc4 contains several Out-Of-Bounds Reads in the NTLM Authentication module that results in a Denial of Service (segfault).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.0:freerdp-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-server-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-wayland-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libfreerdp2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libuwac0-0-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libwinpr2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:uwac0-0-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:winpr2-devel-2.0.0~rc4-lp150.2.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-8789", url: "https://www.suse.com/security/cve/CVE-2018-8789", }, { category: "external", summary: "SUSE Bug 1117963 for CVE-2018-8789", url: "https://bugzilla.suse.com/1117963", }, { category: "external", summary: "SUSE Bug 1117965 for CVE-2018-8789", url: "https://bugzilla.suse.com/1117965", }, { category: "external", summary: "SUSE Bug 1131873 for CVE-2018-8789", url: "https://bugzilla.suse.com/1131873", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.0:freerdp-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-server-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-wayland-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libfreerdp2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libuwac0-0-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libwinpr2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:uwac0-0-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:winpr2-devel-2.0.0~rc4-lp150.2.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.0:freerdp-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-server-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:freerdp-wayland-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libfreerdp2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libuwac0-0-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:libwinpr2-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:uwac0-0-devel-2.0.0~rc4-lp150.2.3.1.x86_64", "openSUSE Leap 15.0:winpr2-devel-2.0.0~rc4-lp150.2.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-03-23T11:14:11Z", details: "moderate", }, ], title: "CVE-2018-8789", }, ], }
fkie_cve-2018-1000852
Vulnerability from fkie_nvd
Published
2018-12-20 15:29
Modified
2024-11-21 03:40
Severity ?
Summary
FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via RDPClient must connect the rdp server with echo option. This vulnerability appears to have been fixed in after commit 205c612820dac644d665b5bb1cdf437dc5ca01e3.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
freerdp | freerdp | * | |
freerdp | freerdp | 2.0.0 | |
freerdp | freerdp | 2.0.0 | |
freerdp | freerdp | 2.0.0 | |
freerdp | freerdp | 2.0.0 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 19.10 | |
canonical | ubuntu_linux | 20.04 | |
fedoraproject | fedora | 28 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*", matchCriteriaId: "F4CC65E0-718B-44E3-A05A-913698689674", versionEndExcluding: "2.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:freerdp:freerdp:2.0.0:-:*:*:*:*:*:*", matchCriteriaId: "46A636A2-66DD-4926-8984-ABEC06E1735B", vulnerable: true, }, { criteria: "cpe:2.3:a:freerdp:freerdp:2.0.0:rc0:*:*:*:*:*:*", matchCriteriaId: "C9D8EB00-9004-4493-BC51-E8E1E0F5B83A", vulnerable: true, }, { criteria: "cpe:2.3:a:freerdp:freerdp:2.0.0:rc1:*:*:*:*:*:*", matchCriteriaId: "F226993C-3AB8-4F86-8591-40CAAC8DD73E", vulnerable: true, }, { criteria: "cpe:2.3:a:freerdp:freerdp:2.0.0:rc2:*:*:*:*:*:*", matchCriteriaId: "985D90BF-3B2B-4A3C-B698-DBCB0241B95B", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", matchCriteriaId: "A31C8344-3E02-4EB8-8BD8-4C84B7959624", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", matchCriteriaId: "902B8056-9E37-443B-8905-8AA93E2447FB", vulnerable: true, }, { criteria: "cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*", matchCriteriaId: "DC1BD7B7-6D88-42B8-878E-F1318CA5FCAF", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via RDPClient must connect the rdp server with echo option. This vulnerability appears to have been fixed in after commit 205c612820dac644d665b5bb1cdf437dc5ca01e3.", }, { lang: "es", value: "FreeRDP 2.0.0-rc3, en versiones anteriores al commit con ID 205c612820dac644d665b5bb1cdf437dc5ca01e3, contiene una vulnerabilidad desconocida en channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request que puede resultar en que el servidor RDP sea capaz de leer la memoria del cliente. El cliente debe conectarse al servidor RDP con la opción \"echo\". La vulnerabilidad parece haber sido solucionada tras el commit con ID 205c612820dac644d665b5bb1cdf437dc5ca01e3.", }, ], id: "CVE-2018-1000852", lastModified: "2024-11-21T03:40:29.923", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.4, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 2.5, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-12-20T15:29:02.597", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2019:2157", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://github.com/FreeRDP/FreeRDP/issues/4866", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/FreeRDP/FreeRDP/pull/4871", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/FreeRDP/FreeRDP/pull/4871/commits/baee520e3dd9be6511c45a14c5f5e77784de1471", }, { source: "cve@mitre.org", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YVJKO2DR5EY4C4QZOP7SNNBEW2JW6FHX/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4379-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2019:2157", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://github.com/FreeRDP/FreeRDP/issues/4866", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/FreeRDP/FreeRDP/pull/4871", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/FreeRDP/FreeRDP/pull/4871/commits/baee520e3dd9be6511c45a14c5f5e77784de1471", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YVJKO2DR5EY4C4QZOP7SNNBEW2JW6FHX/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4379-1/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.