FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in the `urbdrc` channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch. https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mvxm-wfj2-5fvh
Created freerdp tracking bugs for this issue: Affects: fedora-35 [bug 2143672] Affects: fedora-36 [bug 2143676] Affects: fedora-37 [bug 2143677] Created freerdp1.2 tracking bugs for this issue: Affects: epel-7 [bug 2143668]
Upstream Commit: https://github.com/FreeRDP/FreeRDP/commit/ff82ae84342f68afc37f289a164d65ee3daefe97 https://github.com/FreeRDP/FreeRDP/commit/11555828d2cf289b350baba5ad1f462f10b80b76
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:2326 https://access.redhat.com/errata/RHSA-2023:2326
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:2851 https://access.redhat.com/errata/RHSA-2023:2851
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-39319