FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in `drive` channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the drive redirection channel - command line options `/drive`, `+drives` or `+home-drive`. https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-pmv3-wpw4-pw5h
Created freerdp tracking bugs for this issue: Affects: fedora-35 [bug 2143667] Affects: fedora-36 [bug 2143671] Affects: fedora-37 [bug 2143675] Created freerdp1.2 tracking bugs for this issue: Affects: epel-7 [bug 2143665]
Upstream Commit: https://github.com/FreeRDP/FreeRDP/commit/6655841cf2a00b764f855040aecb8803cfc5eaba
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:2326 https://access.redhat.com/errata/RHSA-2023:2326
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:2851 https://access.redhat.com/errata/RHSA-2023:2851
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-41877