An update for freerdp is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2022-2120
Final
1.0
1.0
2022-11-30
Initial
2022-11-30
2022-11-30
openEuler SA Tool V1.0
2022-11-30
freerdp security update
An update for freerdp is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS.
FreeRDP is a client implementation of the Remote Desktop Protocol (RDP) that follows Microsoft's open specifications. This package provides the client applications xfreerdp and wlfreerdp.
Security Fix(es):
FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing a range check for input offset index in ZGFX decoder. A malicious server can trick a FreeRDP based client to read out of bound data and try to decode it. This issue has been addressed in version 2.9.0. There are no known workarounds for this issue.(CVE-2022-39317)
FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP may attempt integer addition on too narrow types leads to allocation of a buffer too small holding the data written. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch.(CVE-2022-39320)
An update for freerdp is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS.
openEuler Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
Critical
freerdp
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2120
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-39317
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-39320
https://nvd.nist.gov/vuln/detail/CVE-2022-39317
https://nvd.nist.gov/vuln/detail/CVE-2022-39320
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
libwinpr-2.8.1-3.oe1.aarch64.rpm
freerdp-debuginfo-2.8.1-3.oe1.aarch64.rpm
freerdp-devel-2.8.1-3.oe1.aarch64.rpm
libwinpr-devel-2.8.1-3.oe1.aarch64.rpm
freerdp-help-2.8.1-3.oe1.aarch64.rpm
freerdp-2.8.1-3.oe1.aarch64.rpm
freerdp-debugsource-2.8.1-3.oe1.aarch64.rpm
freerdp-help-2.8.1-3.oe1.aarch64.rpm
freerdp-debugsource-2.8.1-3.oe1.aarch64.rpm
freerdp-2.8.1-3.oe1.aarch64.rpm
freerdp-devel-2.8.1-3.oe1.aarch64.rpm
freerdp-debuginfo-2.8.1-3.oe1.aarch64.rpm
libwinpr-devel-2.8.1-3.oe1.aarch64.rpm
libwinpr-2.8.1-3.oe1.aarch64.rpm
freerdp-debugsource-2.8.1-3.oe2203.aarch64.rpm
freerdp-help-2.8.1-3.oe2203.aarch64.rpm
freerdp-debuginfo-2.8.1-3.oe2203.aarch64.rpm
libwinpr-2.8.1-3.oe2203.aarch64.rpm
freerdp-devel-2.8.1-3.oe2203.aarch64.rpm
libwinpr-devel-2.8.1-3.oe2203.aarch64.rpm
freerdp-2.8.1-3.oe2203.aarch64.rpm
freerdp-2.8.1-3.oe1.src.rpm
freerdp-2.8.1-3.oe1.src.rpm
freerdp-2.8.1-3.oe2203.src.rpm
freerdp-debugsource-2.8.1-3.oe1.x86_64.rpm
freerdp-debuginfo-2.8.1-3.oe1.x86_64.rpm
freerdp-devel-2.8.1-3.oe1.x86_64.rpm
freerdp-help-2.8.1-3.oe1.x86_64.rpm
freerdp-2.8.1-3.oe1.x86_64.rpm
libwinpr-2.8.1-3.oe1.x86_64.rpm
libwinpr-devel-2.8.1-3.oe1.x86_64.rpm
freerdp-help-2.8.1-3.oe1.x86_64.rpm
libwinpr-2.8.1-3.oe1.x86_64.rpm
libwinpr-devel-2.8.1-3.oe1.x86_64.rpm
freerdp-devel-2.8.1-3.oe1.x86_64.rpm
freerdp-debuginfo-2.8.1-3.oe1.x86_64.rpm
freerdp-2.8.1-3.oe1.x86_64.rpm
freerdp-debugsource-2.8.1-3.oe1.x86_64.rpm
freerdp-debuginfo-2.8.1-3.oe2203.x86_64.rpm
freerdp-devel-2.8.1-3.oe2203.x86_64.rpm
libwinpr-2.8.1-3.oe2203.x86_64.rpm
freerdp-2.8.1-3.oe2203.x86_64.rpm
freerdp-help-2.8.1-3.oe2203.x86_64.rpm
freerdp-debugsource-2.8.1-3.oe2203.x86_64.rpm
libwinpr-devel-2.8.1-3.oe2203.x86_64.rpm
FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing a range check for input offset index in ZGFX decoder. A malicious server can trick a FreeRDP based client to read out of bound data and try to decode it. This issue has been addressed in version 2.9.0. There are no known workarounds for this issue.
2022-11-30
CVE-2022-39317
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
Critical
9.8
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
freerdp security update
2022-11-30
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2120
FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP may attempt integer addition on too narrow types leads to allocation of a buffer too small holding the data written. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch.
2022-11-30
CVE-2022-39320
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
Critical
9.8
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
freerdp security update
2022-11-30
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2120