freerdp-2.4.1-5.el9

エラータID: AXSA:2023-5536:02

Release date: 
Thursday, May 25, 2023 - 09:37
Subject: 
freerdp-2.4.1-5.el9
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
Moderate
Description: 

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.

Security Fix(es):

* freerdp: clients using `/parallel` command line switch might read uninitialized data (CVE-2022-39282)
* freerdp: clients using the `/video` command line switch might read uninitialized data (CVE-2022-39283)
* freerdp: out of bounds read in zgfx decoder (CVE-2022-39316)
* freerdp: undefined behaviour in zgfx decoder (CVE-2022-39317)
* freerdp: division by zero in urbdrc channel (CVE-2022-39318)
* freerdp: missing length validation in urbdrc channel (CVE-2022-39319)
* freerdp: heap buffer overflow in urbdrc channel (CVE-2022-39320)
* freerdp: missing path sanitation with `drive` channel (CVE-2022-39347)
* freerdp: missing input length validation in `drive` channel (CVE-2022-41877)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the MIRACLE LINUX 9.2 Release Notes linked from the References section.

CVE-2022-39282
FreeRDP is a free remote desktop protocol library and clients. FreeRDP based clients on unix systems using `/parallel` command line switch might read uninitialized data and send it to the server the client is currently connected to. FreeRDP based server implementations are not affected. Please upgrade to 2.8.1 where this issue is patched. If unable to upgrade, do not use parallel port redirection (`/parallel` command line switch) as a workaround.
CVE-2022-39283
FreeRDP is a free remote desktop protocol library and clients. All FreeRDP based clients when using the `/video` command line switch might read uninitialized data, decode it as audio/video and display the result. FreeRDP based server implementations are not affected. This issue has been patched in version 2.8.1. If you cannot upgrade do not use the `/video` switch.
CVE-2022-39316
FreeRDP is a free remote desktop protocol library and clients. In affected versions there is an out of bound read in ZGFX decoder component of FreeRDP. A malicious server can trick a FreeRDP based client to read out of bound data and try to decode it likely resulting in a crash. This issue has been addressed in the 2.9.0 release. Users are advised to upgrade.
CVE-2022-39317
FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing a range check for input offset index in ZGFX decoder. A malicious server can trick a FreeRDP based client to read out of bound data and try to decode it. This issue has been addressed in version 2.9.0. There are no known workarounds for this issue.
CVE-2022-39318
FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input validation in `urbdrc` channel. A malicious server can trick a FreeRDP based client to crash with division by zero. This issue has been addressed in version 2.9.0. All users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch.
CVE-2022-39319
FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in the `urbdrc` channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch.
CVE-2022-39320
FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP may attempt integer addition on too narrow types leads to allocation of a buffer too small holding the data written. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch.
CVE-2022-39347
FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing path canonicalization and base path check for `drive` channel. A malicious server can trick a FreeRDP based client to read files outside the shared directory. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/drive`, `/drives` or `+home-drive` redirection switch.
CVE-2022-41877
FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in `drive` channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the drive redirection channel - command line options `/drive`, `+drives` or `+home-drive`.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. freerdp-2.4.1-5.el9.src.rpm
    MD5: 09886add42146f33e5db4d5c57ff7888
    SHA-256: 303b888cfe03d6547963c2b92140df641bcd2c4257bc0f09e5ef6afcb3cc1ad0
    Size: 6.94 MB

Asianux Server 9 for x86_64
  1. freerdp-2.4.1-5.el9.x86_64.rpm
    MD5: 901baccfc7d54f2d3b01e3c19b1fcfc8
    SHA-256: c8feff46e31ee9c4c5f40ed7fdedc82b6b2bc09737b0e8a0a5417f31eeef3e29
    Size: 110.55 kB
  2. freerdp-devel-2.4.1-5.el9.i686.rpm
    MD5: 174913f993891db5ded0306d53da1a2d
    SHA-256: 345c8d15d34fc466fc35607eb87711bce032be74fbcadf2e1ca02069de5ec6ac
    Size: 131.90 kB
  3. freerdp-devel-2.4.1-5.el9.x86_64.rpm
    MD5: 0f7805ae808385f514c5e240fc8f5217
    SHA-256: 1046cbf88411b9b857bd9bcc10bab6346c833dc7fdb5c516e1e47ade4acd9e73
    Size: 131.92 kB
  4. freerdp-libs-2.4.1-5.el9.i686.rpm
    MD5: 53c85736a1dc1d3261ebd06c60f78319
    SHA-256: eea196da66d50732e28b7c2bcfe60ff5fe10044d641c700929f5d4529f7d6016
    Size: 822.55 kB
  5. freerdp-libs-2.4.1-5.el9.x86_64.rpm
    MD5: 2b0aa810ee69a234b1bf6c799b9dfd4b
    SHA-256: c9da5747d8e58be855530c7aa5c758af8fa5148226fd84dd87ed4bed8d231a70
    Size: 872.79 kB
  6. libwinpr-2.4.1-5.el9.i686.rpm
    MD5: 853d843a30d5b7d21344aa72805491ae
    SHA-256: 46c9694077daccbd5a4e30de5dadcd688b6776590d73633cb7443b8f90dba116
    Size: 330.72 kB
  7. libwinpr-2.4.1-5.el9.x86_64.rpm
    MD5: 6124afb6965e21408d638565231d6e44
    SHA-256: 21a5f28f182bf4656e1e379cea500329bee29c622c79ad88430150d7337f2199
    Size: 344.30 kB
  8. libwinpr-devel-2.4.1-5.el9.i686.rpm
    MD5: 84dd49d5f373b2e5b95ce7afeb7c5ce5
    SHA-256: d9265f863b3653797a4c52bf21d845b5f44d1dacb89a56ab4ea740069bdb436f
    Size: 163.53 kB
  9. libwinpr-devel-2.4.1-5.el9.x86_64.rpm
    MD5: 380dfa719576f61bf445de0475aaf423
    SHA-256: 01d921f776cffaa78ec00008f979a45cb5e08d62ee30af68b55876797a13ed0d
    Size: 163.54 kB