An update for freerdp is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2022-2120 Final 1.0 1.0 2022-11-30 Initial 2022-11-30 2022-11-30 openEuler SA Tool V1.0 2022-11-30 freerdp security update An update for freerdp is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS. FreeRDP is a client implementation of the Remote Desktop Protocol (RDP) that follows Microsoft's open specifications. This package provides the client applications xfreerdp and wlfreerdp. Security Fix(es): FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing a range check for input offset index in ZGFX decoder. A malicious server can trick a FreeRDP based client to read out of bound data and try to decode it. This issue has been addressed in version 2.9.0. There are no known workarounds for this issue.(CVE-2022-39317) FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP may attempt integer addition on too narrow types leads to allocation of a buffer too small holding the data written. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch.(CVE-2022-39320) An update for freerdp is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS. openEuler Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. Critical freerdp https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2120 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-39317 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-39320 https://nvd.nist.gov/vuln/detail/CVE-2022-39317 https://nvd.nist.gov/vuln/detail/CVE-2022-39320 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS libwinpr-2.8.1-3.oe1.aarch64.rpm freerdp-debuginfo-2.8.1-3.oe1.aarch64.rpm freerdp-devel-2.8.1-3.oe1.aarch64.rpm libwinpr-devel-2.8.1-3.oe1.aarch64.rpm freerdp-help-2.8.1-3.oe1.aarch64.rpm freerdp-2.8.1-3.oe1.aarch64.rpm freerdp-debugsource-2.8.1-3.oe1.aarch64.rpm freerdp-help-2.8.1-3.oe1.aarch64.rpm freerdp-debugsource-2.8.1-3.oe1.aarch64.rpm freerdp-2.8.1-3.oe1.aarch64.rpm freerdp-devel-2.8.1-3.oe1.aarch64.rpm freerdp-debuginfo-2.8.1-3.oe1.aarch64.rpm libwinpr-devel-2.8.1-3.oe1.aarch64.rpm libwinpr-2.8.1-3.oe1.aarch64.rpm freerdp-debugsource-2.8.1-3.oe2203.aarch64.rpm freerdp-help-2.8.1-3.oe2203.aarch64.rpm freerdp-debuginfo-2.8.1-3.oe2203.aarch64.rpm libwinpr-2.8.1-3.oe2203.aarch64.rpm freerdp-devel-2.8.1-3.oe2203.aarch64.rpm libwinpr-devel-2.8.1-3.oe2203.aarch64.rpm freerdp-2.8.1-3.oe2203.aarch64.rpm freerdp-2.8.1-3.oe1.src.rpm freerdp-2.8.1-3.oe1.src.rpm freerdp-2.8.1-3.oe2203.src.rpm freerdp-debugsource-2.8.1-3.oe1.x86_64.rpm freerdp-debuginfo-2.8.1-3.oe1.x86_64.rpm freerdp-devel-2.8.1-3.oe1.x86_64.rpm freerdp-help-2.8.1-3.oe1.x86_64.rpm freerdp-2.8.1-3.oe1.x86_64.rpm libwinpr-2.8.1-3.oe1.x86_64.rpm libwinpr-devel-2.8.1-3.oe1.x86_64.rpm freerdp-help-2.8.1-3.oe1.x86_64.rpm libwinpr-2.8.1-3.oe1.x86_64.rpm libwinpr-devel-2.8.1-3.oe1.x86_64.rpm freerdp-devel-2.8.1-3.oe1.x86_64.rpm freerdp-debuginfo-2.8.1-3.oe1.x86_64.rpm freerdp-2.8.1-3.oe1.x86_64.rpm freerdp-debugsource-2.8.1-3.oe1.x86_64.rpm freerdp-debuginfo-2.8.1-3.oe2203.x86_64.rpm freerdp-devel-2.8.1-3.oe2203.x86_64.rpm libwinpr-2.8.1-3.oe2203.x86_64.rpm freerdp-2.8.1-3.oe2203.x86_64.rpm freerdp-help-2.8.1-3.oe2203.x86_64.rpm freerdp-debugsource-2.8.1-3.oe2203.x86_64.rpm libwinpr-devel-2.8.1-3.oe2203.x86_64.rpm FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing a range check for input offset index in ZGFX decoder. A malicious server can trick a FreeRDP based client to read out of bound data and try to decode it. This issue has been addressed in version 2.9.0. There are no known workarounds for this issue. 2022-11-30 CVE-2022-39317 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS Critical 9.8 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H freerdp security update 2022-11-30 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2120 FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP may attempt integer addition on too narrow types leads to allocation of a buffer too small holding the data written. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch. 2022-11-30 CVE-2022-39320 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS Critical 9.8 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H freerdp security update 2022-11-30 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2120