FreeRDP is vulnerable to out-of-bound read. It is due to a flaw in glyph_cache_put. This affects all FreeRDP clients with +glyph-cache
option enabled.
lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html
www.freerdp.com/2020/06/22/2_1_2-released
github.com/FreeRDP/FreeRDP/commit/c0fd449ec0870b050d350d6d844b1ea6dad4bc7d
github.com/FreeRDP/FreeRDP/security/advisories/GHSA-jr57-f58x-hjmv
lists.fedoraproject.org/archives/list/[email protected]/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/
lists.fedoraproject.org/archives/list/[email protected]/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/
usn.ubuntu.com/4481-1/