Bug 1204257 - (CVE-2022-39283) VUL-0: CVE-2022-39283: freerdp: using the `/video` command line switch might read uninitialized data
(CVE-2022-39283)
VUL-0: CVE-2022-39283: freerdp: using the `/video` command line switch might ...
Status: NEW
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Normal
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/344936/
CVSSv3.1:SUSE:CVE-2022-39283:4.4:(AV:...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2022-10-13 07:11 UTC by Robert Frohl
Modified: 2022-11-15 14:35 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Frohl 2022-10-13 07:11:21 UTC
CVE-2022-39283

FreeRDP is a free remote desktop protocol library and clients. All FreeRDP based
clients when using the `/video` command line switch might read uninitialized
data, decode it as audio/video and display the result. FreeRDP based server
implementations are not affected. This issue has been patched in version 2.8.1.
If you cannot upgrade do not use the `/video` switch.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-39283
http://www.cvedetails.com/cve/CVE-2022-39283/
https://github.com/FreeRDP/FreeRDP/releases/tag/2.8.1
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-6cf9-3328-qrvh
https://www.cve.org/CVERecord?id=CVE-2022-39283
Comment 1 Robert Frohl 2022-10-13 07:14:10 UTC
relevant for Factory and openSUSE:Backports:SLE-15-SP*
Comment 6 Robert Frohl 2022-10-13 09:27:06 UTC
tracking as affected:

- SUSE:SLE-12-SP2:Update/freerdp
- SUSE:SLE-15-SP2:Update/freerdp
- SUSE:SLE-15-SP4:Update/freerdp
Comment 8 Jia Zhaocong 2022-10-19 08:11:19 UTC
Cleaning up GNOME CVE backlog. The fix has been submitted and accepted. Assign
back to security team.
Comment 9 Swamp Workflow Management 2022-11-15 14:33:06 UTC
SUSE-SU-2022:3982-1: An update that fixes two vulnerabilities is now available.

Category: security (moderate)
Bug References: 1204257,1204258
CVE References: CVE-2022-39282,CVE-2022-39283
JIRA References: 
Sources used:
openSUSE Leap 15.3 (src):    freerdp-2.1.2-150200.15.21.1
SUSE Linux Enterprise Workstation Extension 15-SP3 (src):    freerdp-2.1.2-150200.15.21.1
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3 (src):    freerdp-2.1.2-150200.15.21.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 10 Swamp Workflow Management 2022-11-15 14:33:53 UTC
SUSE-SU-2022:3983-1: An update that fixes two vulnerabilities is now available.

Category: security (moderate)
Bug References: 1204257,1204258
CVE References: CVE-2022-39282,CVE-2022-39283
JIRA References: 
Sources used:
openSUSE Leap 15.4 (src):    freerdp-2.4.0-150400.3.9.1
SUSE Linux Enterprise Workstation Extension 15-SP4 (src):    freerdp-2.4.0-150400.3.9.1
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP4 (src):    freerdp-2.4.0-150400.3.9.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 11 Swamp Workflow Management 2022-11-15 14:35:41 UTC
SUSE-SU-2022:3984-1: An update that fixes two vulnerabilities is now available.

Category: security (moderate)
Bug References: 1204257,1204258
CVE References: CVE-2022-39282,CVE-2022-39283
JIRA References: 
Sources used:
SUSE Linux Enterprise Workstation Extension 12-SP5 (src):    freerdp-2.1.2-12.29.1
SUSE Linux Enterprise Software Development Kit 12-SP5 (src):    freerdp-2.1.2-12.29.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.