An update for freerdp is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1,openEuler-22.03-LTS-SP2 and openEuler-22.03-LTS-SP3
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2024-1108
Final
1.0
1.0
2024-02-02
Initial
2024-02-02
2024-02-02
openEuler SA Tool V1.0
2024-02-02
freerdp security update
An update for freerdp is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1,openEuler-22.03-LTS-SP2 and openEuler-22.03-LTS-SP3.
FreeRDP is a client implementation of the Remote Desktop Protocol (RDP) that follows Microsoft's open specifications. This package provides the client applications xfreerdp and wlfreerdp.
Security Fix(es):
FreeRDP is a set of free and open source remote desktop protocol library and clients. In affected versions an integer overflow in `freerdp_bitmap_planar_context_reset` leads to heap-buffer overflow. This affects FreeRDP based clients. FreeRDP based server implementations and proxy are not affected. A malicious server could prepare a `RDPGFX_RESET_GRAPHICS_PDU` to allocate too small buffers, possibly triggering later out of bound read/write. Data extraction over network is not possible, the buffers are used to display an image. This issue has been addressed in version 2.11.5 and 3.2.0. Users are advised to upgrade. there are no know workarounds for this vulnerability.
(CVE-2024-22211)
An update for freerdp is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1,openEuler-22.03-LTS-SP2 and openEuler-22.03-LTS-SP3.
openEuler Security has rated this update as having a security impact of low. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
Low
freerdp
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1108
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2024-22211
https://nvd.nist.gov/vuln/detail/CVE-2024-22211
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP4
openEuler-22.03-LTS
openEuler-22.03-LTS-SP1
openEuler-22.03-LTS-SP2
openEuler-22.03-LTS-SP3
freerdp-devel-2.11.1-2.oe1.aarch64.rpm
libwinpr-2.11.1-2.oe1.aarch64.rpm
freerdp-2.11.1-2.oe1.aarch64.rpm
freerdp-debugsource-2.11.1-2.oe1.aarch64.rpm
freerdp-help-2.11.1-2.oe1.aarch64.rpm
freerdp-debuginfo-2.11.1-2.oe1.aarch64.rpm
libwinpr-devel-2.11.1-2.oe1.aarch64.rpm
freerdp-2.11.1-2.oe2003sp4.aarch64.rpm
freerdp-debuginfo-2.11.1-2.oe2003sp4.aarch64.rpm
freerdp-help-2.11.1-2.oe2003sp4.aarch64.rpm
freerdp-devel-2.11.1-2.oe2003sp4.aarch64.rpm
freerdp-debugsource-2.11.1-2.oe2003sp4.aarch64.rpm
libwinpr-2.11.1-2.oe2003sp4.aarch64.rpm
libwinpr-devel-2.11.1-2.oe2003sp4.aarch64.rpm
freerdp-debugsource-2.11.1-2.oe2203.aarch64.rpm
freerdp-help-2.11.1-2.oe2203.aarch64.rpm
freerdp-devel-2.11.1-2.oe2203.aarch64.rpm
freerdp-debuginfo-2.11.1-2.oe2203.aarch64.rpm
libwinpr-devel-2.11.1-2.oe2203.aarch64.rpm
libwinpr-2.11.1-2.oe2203.aarch64.rpm
freerdp-2.11.1-2.oe2203.aarch64.rpm
freerdp-debugsource-2.11.1-2.oe2203sp1.aarch64.rpm
libwinpr-devel-2.11.1-2.oe2203sp1.aarch64.rpm
freerdp-devel-2.11.1-2.oe2203sp1.aarch64.rpm
libwinpr-2.11.1-2.oe2203sp1.aarch64.rpm
freerdp-2.11.1-2.oe2203sp1.aarch64.rpm
freerdp-help-2.11.1-2.oe2203sp1.aarch64.rpm
freerdp-debuginfo-2.11.1-2.oe2203sp1.aarch64.rpm
freerdp-debuginfo-2.11.1-2.oe2203sp2.aarch64.rpm
freerdp-help-2.11.1-2.oe2203sp2.aarch64.rpm
freerdp-2.11.1-2.oe2203sp2.aarch64.rpm
freerdp-debugsource-2.11.1-2.oe2203sp2.aarch64.rpm
libwinpr-devel-2.11.1-2.oe2203sp2.aarch64.rpm
libwinpr-2.11.1-2.oe2203sp2.aarch64.rpm
freerdp-devel-2.11.1-2.oe2203sp2.aarch64.rpm
libwinpr-2.11.1-2.oe2203sp3.aarch64.rpm
freerdp-help-2.11.1-2.oe2203sp3.aarch64.rpm
freerdp-devel-2.11.1-2.oe2203sp3.aarch64.rpm
libwinpr-devel-2.11.1-2.oe2203sp3.aarch64.rpm
freerdp-debugsource-2.11.1-2.oe2203sp3.aarch64.rpm
freerdp-debuginfo-2.11.1-2.oe2203sp3.aarch64.rpm
freerdp-2.11.1-2.oe2203sp3.aarch64.rpm
freerdp-2.11.1-2.oe1.src.rpm
freerdp-2.11.1-2.oe2003sp4.src.rpm
freerdp-2.11.1-2.oe2203.src.rpm
freerdp-2.11.1-2.oe2203sp1.src.rpm
freerdp-2.11.1-2.oe2203sp2.src.rpm
freerdp-2.11.1-2.oe2203sp3.src.rpm
freerdp-2.11.1-2.oe1.x86_64.rpm
freerdp-debuginfo-2.11.1-2.oe1.x86_64.rpm
freerdp-debugsource-2.11.1-2.oe1.x86_64.rpm
freerdp-help-2.11.1-2.oe1.x86_64.rpm
libwinpr-devel-2.11.1-2.oe1.x86_64.rpm
libwinpr-2.11.1-2.oe1.x86_64.rpm
freerdp-devel-2.11.1-2.oe1.x86_64.rpm
freerdp-debugsource-2.11.1-2.oe2003sp4.x86_64.rpm
libwinpr-2.11.1-2.oe2003sp4.x86_64.rpm
freerdp-help-2.11.1-2.oe2003sp4.x86_64.rpm
freerdp-devel-2.11.1-2.oe2003sp4.x86_64.rpm
libwinpr-devel-2.11.1-2.oe2003sp4.x86_64.rpm
freerdp-debuginfo-2.11.1-2.oe2003sp4.x86_64.rpm
freerdp-2.11.1-2.oe2003sp4.x86_64.rpm
libwinpr-2.11.1-2.oe2203.x86_64.rpm
freerdp-devel-2.11.1-2.oe2203.x86_64.rpm
freerdp-debugsource-2.11.1-2.oe2203.x86_64.rpm
libwinpr-devel-2.11.1-2.oe2203.x86_64.rpm
freerdp-2.11.1-2.oe2203.x86_64.rpm
freerdp-help-2.11.1-2.oe2203.x86_64.rpm
freerdp-debuginfo-2.11.1-2.oe2203.x86_64.rpm
freerdp-debuginfo-2.11.1-2.oe2203sp1.x86_64.rpm
freerdp-devel-2.11.1-2.oe2203sp1.x86_64.rpm
libwinpr-2.11.1-2.oe2203sp1.x86_64.rpm
freerdp-help-2.11.1-2.oe2203sp1.x86_64.rpm
freerdp-2.11.1-2.oe2203sp1.x86_64.rpm
libwinpr-devel-2.11.1-2.oe2203sp1.x86_64.rpm
freerdp-debugsource-2.11.1-2.oe2203sp1.x86_64.rpm
freerdp-debugsource-2.11.1-2.oe2203sp2.x86_64.rpm
freerdp-help-2.11.1-2.oe2203sp2.x86_64.rpm
freerdp-2.11.1-2.oe2203sp2.x86_64.rpm
libwinpr-2.11.1-2.oe2203sp2.x86_64.rpm
libwinpr-devel-2.11.1-2.oe2203sp2.x86_64.rpm
freerdp-devel-2.11.1-2.oe2203sp2.x86_64.rpm
freerdp-debuginfo-2.11.1-2.oe2203sp2.x86_64.rpm
freerdp-2.11.1-2.oe2203sp3.x86_64.rpm
freerdp-help-2.11.1-2.oe2203sp3.x86_64.rpm
libwinpr-devel-2.11.1-2.oe2203sp3.x86_64.rpm
libwinpr-2.11.1-2.oe2203sp3.x86_64.rpm
freerdp-devel-2.11.1-2.oe2203sp3.x86_64.rpm
freerdp-debugsource-2.11.1-2.oe2203sp3.x86_64.rpm
freerdp-debuginfo-2.11.1-2.oe2203sp3.x86_64.rpm
FreeRDP is a set of free and open source remote desktop protocol library and clients. In affected versions an integer overflow in `freerdp_bitmap_planar_context_reset` leads to heap-buffer overflow. This affects FreeRDP based clients. FreeRDP based server implementations and proxy are not affected. A malicious server could prepare a `RDPGFX_RESET_GRAPHICS_PDU` to allocate too small buffers, possibly triggering later out of bound read/write. Data extraction over network is not possible, the buffers are used to display an image. This issue has been addressed in version 2.11.5 and 3.2.0. Users are advised to upgrade. there are no know workarounds for this vulnerability.
2024-02-02
CVE-2024-22211
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP4
openEuler-22.03-LTS
openEuler-22.03-LTS-SP1
openEuler-22.03-LTS-SP2
openEuler-22.03-LTS-SP3
Low
3.7
AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L
freerdp security update
2024-02-02
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1108