An update for freerdp is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2022-2112 Final 1.0 1.0 2022-11-25 Initial 2022-11-25 2022-11-25 openEuler SA Tool V1.0 2022-11-25 freerdp security update An update for freerdp is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS. FreeRDP is a client implementation of the Remote Desktop Protocol (RDP) that follows Microsoft's open specifications. This package provides the client applications xfreerdp and wlfreerdp. Security Fix(es): FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing path canonicalization and base path check for `drive` channel. A malicious server can trick a FreeRDP based client to read files outside the shared directory. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/drive`, `/drives` or `+home-drive` redirection switch.(CVE-2022-39347) FreeRDP is a free remote desktop protocol library and clients. In affected versions there is an out of bound read in ZGFX decoder component of FreeRDP. A malicious server can trick a FreeRDP based client to read out of bound data and try to decode it likely resulting in a crash. This issue has been addressed in the 2.9.0 release. Users are advised to upgrade.(CVE-2022-39316) FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in the `urbdrc` channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch.(CVE-2022-39319) FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in `drive` channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the drive redirection channel - command line options `/drive`, `+drives` or `+home-drive`.(CVE-2022-41877) FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input validation in `urbdrc` channel. A malicious server can trick a FreeRDP based client to crash with division by zero. This issue has been addressed in version 2.9.0. All users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch.(CVE-2022-39318) An update for freerdp is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS. openEuler Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. Critical freerdp https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2112 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-39347 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-39316 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-39319 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-41877 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-39318 https://nvd.nist.gov/vuln/detail/CVE-2022-39347 https://nvd.nist.gov/vuln/detail/CVE-2022-39316 https://nvd.nist.gov/vuln/detail/CVE-2022-39319 https://nvd.nist.gov/vuln/detail/CVE-2022-41877 https://nvd.nist.gov/vuln/detail/CVE-2022-39318 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS freerdp-2.8.1-2.oe1.aarch64.rpm freerdp-help-2.8.1-2.oe1.aarch64.rpm libwinpr-2.8.1-2.oe1.aarch64.rpm freerdp-debugsource-2.8.1-2.oe1.aarch64.rpm freerdp-debuginfo-2.8.1-2.oe1.aarch64.rpm libwinpr-devel-2.8.1-2.oe1.aarch64.rpm freerdp-devel-2.8.1-2.oe1.aarch64.rpm freerdp-2.8.1-2.oe1.aarch64.rpm libwinpr-devel-2.8.1-2.oe1.aarch64.rpm freerdp-debuginfo-2.8.1-2.oe1.aarch64.rpm libwinpr-2.8.1-2.oe1.aarch64.rpm freerdp-debugsource-2.8.1-2.oe1.aarch64.rpm freerdp-help-2.8.1-2.oe1.aarch64.rpm freerdp-devel-2.8.1-2.oe1.aarch64.rpm freerdp-devel-2.8.1-2.oe2203.aarch64.rpm freerdp-debugsource-2.8.1-2.oe2203.aarch64.rpm freerdp-help-2.8.1-2.oe2203.aarch64.rpm libwinpr-2.8.1-2.oe2203.aarch64.rpm freerdp-debuginfo-2.8.1-2.oe2203.aarch64.rpm freerdp-2.8.1-2.oe2203.aarch64.rpm libwinpr-devel-2.8.1-2.oe2203.aarch64.rpm freerdp-2.8.1-2.oe1.src.rpm freerdp-2.8.1-2.oe1.src.rpm freerdp-2.8.1-2.oe2203.src.rpm freerdp-help-2.8.1-2.oe1.x86_64.rpm freerdp-devel-2.8.1-2.oe1.x86_64.rpm libwinpr-devel-2.8.1-2.oe1.x86_64.rpm freerdp-2.8.1-2.oe1.x86_64.rpm freerdp-debuginfo-2.8.1-2.oe1.x86_64.rpm freerdp-debugsource-2.8.1-2.oe1.x86_64.rpm libwinpr-2.8.1-2.oe1.x86_64.rpm freerdp-debugsource-2.8.1-2.oe1.x86_64.rpm freerdp-devel-2.8.1-2.oe1.x86_64.rpm freerdp-2.8.1-2.oe1.x86_64.rpm freerdp-debuginfo-2.8.1-2.oe1.x86_64.rpm libwinpr-2.8.1-2.oe1.x86_64.rpm libwinpr-devel-2.8.1-2.oe1.x86_64.rpm freerdp-help-2.8.1-2.oe1.x86_64.rpm freerdp-devel-2.8.1-2.oe2203.x86_64.rpm freerdp-debugsource-2.8.1-2.oe2203.x86_64.rpm freerdp-2.8.1-2.oe2203.x86_64.rpm freerdp-debuginfo-2.8.1-2.oe2203.x86_64.rpm libwinpr-2.8.1-2.oe2203.x86_64.rpm freerdp-help-2.8.1-2.oe2203.x86_64.rpm libwinpr-devel-2.8.1-2.oe2203.x86_64.rpm FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing path canonicalization and base path check for `drive` channel. A malicious server can trick a FreeRDP based client to read files outside the shared directory. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/drive`, `/drives` or `+home-drive` redirection switch. 2022-11-25 CVE-2022-39347 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS High 7.5 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N freerdp security update 2022-11-25 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2112 FreeRDP is a free remote desktop protocol library and clients. In affected versions there is an out of bound read in ZGFX decoder component of FreeRDP. A malicious server can trick a FreeRDP based client to read out of bound data and try to decode it likely resulting in a crash. This issue has been addressed in the 2.9.0 release. Users are advised to upgrade. 2022-11-25 CVE-2022-39316 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS High 7.5 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H freerdp security update 2022-11-25 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2112 FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in the `urbdrc` channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch. 2022-11-25 CVE-2022-39319 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS Critical 9.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H freerdp security update 2022-11-25 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2112 FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in `drive` channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the drive redirection channel - command line options `/drive`, `+drives` or `+home-drive`. 2022-11-25 CVE-2022-41877 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS Critical 9.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H freerdp security update 2022-11-25 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2112 FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input validation in `urbdrc` channel. A malicious server can trick a FreeRDP based client to crash with division by zero. This issue has been addressed in version 2.9.0. All users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch. 2022-11-25 CVE-2022-39318 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS High 7.5 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H freerdp security update 2022-11-25 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2112