File _patchinfo of Package patchinfo.34872

<patchinfo incident="34872">
  <issue tracker="cve" id="2024-32660"/>
  <issue tracker="cve" id="2024-32658"/>
  <issue tracker="cve" id="2024-32661"/>
  <issue tracker="cve" id="2024-32659"/>
  <issue tracker="cve" id="2024-22211"/>
  <issue tracker="bnc" id="1223353">VUL-0: CVE-2024-32658: freerdp: out-of-bounds read in Interleaved RLE Bitmap Codec in FreeRDP based clients</issue>
  <issue tracker="bnc" id="1223347">VUL-0: CVE-2024-32660: freerdp: client crash via invalid huge allocation size</issue>
  <issue tracker="bnc" id="1223346">VUL-0: CVE-2024-32659: freerdp: out-of-bounds read if `((nWidth == 0) and (nHeight == 0))`</issue>
  <issue tracker="bnc" id="1223348">VUL-0: CVE-2024-32661: freerdp: client NULL pointer dereference</issue>
  <issue tracker="bnc" id="1219049">VUL-0: CVE-2024-22211: freerdp: In affected versions an integer overflow in `freerdp_bitmap_planar_context_reset` leads to heap-buffer overflow.</issue>
  <packager>yudaike</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for freerdp</summary>
  <description>This update for freerdp fixes the following issues:

- CVE-2024-22211: Fixed integer overflow in `freerdp_bitmap_planar_context_reset` that could lead to heap-buffer overflow (bsc#1219049)
- CVE-2024-32658: Fixed out-of-bounds read in Interleaved RLE Bitmap Codec in FreeRDP based clients (bsc#1223353)
- CVE-2024-32659: Fixed out-of-bounds read if `((nWidth == 0) and (nHeight == 0))` (bsc#1223346)
- CVE-2024-32660: Fixed client crash via invalid huge allocation size (bsc#1223347)
- CVE-2024-32661: Fixed client NULL pointer dereference (bsc#1223348)
</description>
</patchinfo>
openSUSE Build Service is sponsored by