Fedora Linux 8566 Published by

A freerdp security update has been released for Fedora 35.



SECURITY: Fedora 35 Update: freerdp-2.7.0-1.fc35


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-a3e03a200b
2022-05-11 01:22:59.731387
--------------------------------------------------------------------------------

Name : freerdp
Product : Fedora 35
Version : 2.7.0
Release : 1.fc35
URL :   http://www.freerdp.com/
Summary : Free implementation of the Remote Desktop Protocol (RDP)
Description :
The xfreerdp & wlfreerdp Remote Desktop Protocol (RDP) clients from the FreeRDP
project.

xfreerdp & wlfreerdp can connect to RDP servers such as Microsoft Windows
machines, xrdp and VirtualBox.

--------------------------------------------------------------------------------
Update Information:

Update to 2.7.0. Security fixes for CVE-2022-24882, CVE-2022-24883.
--------------------------------------------------------------------------------
ChangeLog:

* Mon Apr 25 2022 Ondrej Holy - 2:2.7.0-1
- Update to 2.7.0.
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2079056 - CVE-2022-24882 freerdp: Server side NTLM does not properly check parameters
  https://bugzilla.redhat.com/show_bug.cgi?id=2079056
[ 2 ] Bug #2079057 - CVE-2022-24883 freerdp: Server Side Auth Against a SAM File May Succeed for Invalid Creds
  https://bugzilla.redhat.com/show_bug.cgi?id=2079057
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-a3e03a200b' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________