Mageia 2022-0437: freerdp security update
Summary
FreeRDP based clients on unix systems using `/parallel` command line
switch might read uninitialized data and send it to the server the client
is currently connected to. (CVE-2022-39282)
All FreeRDP based clients when using the `/video` command line switch
might read uninitialized data, decode it as audio/video and display the
result. (CVE-2022-39283)
References
- https://bugs.mageia.org/show_bug.cgi?id=31136
- https://lists.suse.com/pipermail/sle-security-updates/2022-November/012920.html
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c45q-wcpg-mxjq
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-6cf9-3328-qrvh
- https://github.com/FreeRDP/FreeRDP/releases/tag/2.8.1
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJA3DXXYKZSQPM7VF5GX343WBGCGAPAH/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39282
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39283
Resolution
MGASA-2022-0437 - Updated freerdp packages fix security vulnerability
SRPMS
- 8/core/freerdp-2.2.0-1.3.mga8