An update for freerdp is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2022-2112
Final
1.0
1.0
2022-11-25
Initial
2022-11-25
2022-11-25
openEuler SA Tool V1.0
2022-11-25
freerdp security update
An update for freerdp is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS.
FreeRDP is a client implementation of the Remote Desktop Protocol (RDP) that follows Microsoft's open specifications. This package provides the client applications xfreerdp and wlfreerdp.
Security Fix(es):
FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing path canonicalization and base path check for `drive` channel. A malicious server can trick a FreeRDP based client to read files outside the shared directory. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/drive`, `/drives` or `+home-drive` redirection switch.(CVE-2022-39347)
FreeRDP is a free remote desktop protocol library and clients. In affected versions there is an out of bound read in ZGFX decoder component of FreeRDP. A malicious server can trick a FreeRDP based client to read out of bound data and try to decode it likely resulting in a crash. This issue has been addressed in the 2.9.0 release. Users are advised to upgrade.(CVE-2022-39316)
FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in the `urbdrc` channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch.(CVE-2022-39319)
FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in `drive` channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the drive redirection channel - command line options `/drive`, `+drives` or `+home-drive`.(CVE-2022-41877)
FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input validation in `urbdrc` channel. A malicious server can trick a FreeRDP based client to crash with division by zero. This issue has been addressed in version 2.9.0. All users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch.(CVE-2022-39318)
An update for freerdp is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS.
openEuler Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
Critical
freerdp
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2112
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-39347
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-39316
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-39319
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-41877
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-39318
https://nvd.nist.gov/vuln/detail/CVE-2022-39347
https://nvd.nist.gov/vuln/detail/CVE-2022-39316
https://nvd.nist.gov/vuln/detail/CVE-2022-39319
https://nvd.nist.gov/vuln/detail/CVE-2022-41877
https://nvd.nist.gov/vuln/detail/CVE-2022-39318
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
freerdp-2.8.1-2.oe1.aarch64.rpm
freerdp-help-2.8.1-2.oe1.aarch64.rpm
libwinpr-2.8.1-2.oe1.aarch64.rpm
freerdp-debugsource-2.8.1-2.oe1.aarch64.rpm
freerdp-debuginfo-2.8.1-2.oe1.aarch64.rpm
libwinpr-devel-2.8.1-2.oe1.aarch64.rpm
freerdp-devel-2.8.1-2.oe1.aarch64.rpm
freerdp-2.8.1-2.oe1.aarch64.rpm
libwinpr-devel-2.8.1-2.oe1.aarch64.rpm
freerdp-debuginfo-2.8.1-2.oe1.aarch64.rpm
libwinpr-2.8.1-2.oe1.aarch64.rpm
freerdp-debugsource-2.8.1-2.oe1.aarch64.rpm
freerdp-help-2.8.1-2.oe1.aarch64.rpm
freerdp-devel-2.8.1-2.oe1.aarch64.rpm
freerdp-devel-2.8.1-2.oe2203.aarch64.rpm
freerdp-debugsource-2.8.1-2.oe2203.aarch64.rpm
freerdp-help-2.8.1-2.oe2203.aarch64.rpm
libwinpr-2.8.1-2.oe2203.aarch64.rpm
freerdp-debuginfo-2.8.1-2.oe2203.aarch64.rpm
freerdp-2.8.1-2.oe2203.aarch64.rpm
libwinpr-devel-2.8.1-2.oe2203.aarch64.rpm
freerdp-2.8.1-2.oe1.src.rpm
freerdp-2.8.1-2.oe1.src.rpm
freerdp-2.8.1-2.oe2203.src.rpm
freerdp-help-2.8.1-2.oe1.x86_64.rpm
freerdp-devel-2.8.1-2.oe1.x86_64.rpm
libwinpr-devel-2.8.1-2.oe1.x86_64.rpm
freerdp-2.8.1-2.oe1.x86_64.rpm
freerdp-debuginfo-2.8.1-2.oe1.x86_64.rpm
freerdp-debugsource-2.8.1-2.oe1.x86_64.rpm
libwinpr-2.8.1-2.oe1.x86_64.rpm
freerdp-debugsource-2.8.1-2.oe1.x86_64.rpm
freerdp-devel-2.8.1-2.oe1.x86_64.rpm
freerdp-2.8.1-2.oe1.x86_64.rpm
freerdp-debuginfo-2.8.1-2.oe1.x86_64.rpm
libwinpr-2.8.1-2.oe1.x86_64.rpm
libwinpr-devel-2.8.1-2.oe1.x86_64.rpm
freerdp-help-2.8.1-2.oe1.x86_64.rpm
freerdp-devel-2.8.1-2.oe2203.x86_64.rpm
freerdp-debugsource-2.8.1-2.oe2203.x86_64.rpm
freerdp-2.8.1-2.oe2203.x86_64.rpm
freerdp-debuginfo-2.8.1-2.oe2203.x86_64.rpm
libwinpr-2.8.1-2.oe2203.x86_64.rpm
freerdp-help-2.8.1-2.oe2203.x86_64.rpm
libwinpr-devel-2.8.1-2.oe2203.x86_64.rpm
FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing path canonicalization and base path check for `drive` channel. A malicious server can trick a FreeRDP based client to read files outside the shared directory. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/drive`, `/drives` or `+home-drive` redirection switch.
2022-11-25
CVE-2022-39347
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
High
7.5
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
freerdp security update
2022-11-25
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2112
FreeRDP is a free remote desktop protocol library and clients. In affected versions there is an out of bound read in ZGFX decoder component of FreeRDP. A malicious server can trick a FreeRDP based client to read out of bound data and try to decode it likely resulting in a crash. This issue has been addressed in the 2.9.0 release. Users are advised to upgrade.
2022-11-25
CVE-2022-39316
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
High
7.5
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
freerdp security update
2022-11-25
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2112
FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in the `urbdrc` channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch.
2022-11-25
CVE-2022-39319
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
Critical
9.1
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
freerdp security update
2022-11-25
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2112
FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in `drive` channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the drive redirection channel - command line options `/drive`, `+drives` or `+home-drive`.
2022-11-25
CVE-2022-41877
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
Critical
9.1
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
freerdp security update
2022-11-25
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2112
FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input validation in `urbdrc` channel. A malicious server can trick a FreeRDP based client to crash with division by zero. This issue has been addressed in version 2.9.0. All users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch.
2022-11-25
CVE-2022-39318
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
High
7.5
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
freerdp security update
2022-11-25
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2112