Bug 2430881 (CVE-2026-23732)

Summary: CVE-2026-23732 freerdp: FreeRDP: Denial of Service via FastGlyph parsing buffer overflow
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in FreeRDP. A malicious server can exploit a vulnerability in FastGlyph parsing, which improperly trusts data length without sufficient validation. This can lead to a client-side global buffer overflow, resulting in a denial of service (DoS) due to a crash. For this vulnerability to be exploited, a client must connect to a maliciously-configured server.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description OSIDB Bzimport 2026-01-19 18:01:45 UTC
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, FastGlyph parsing trusts `cbData`/remaining length and never validates against the minimum size implied by `cx/cy`. A malicious server can trigger a client‑side global buffer overflow, causing a crash (DoS). Version 3.21.0 contains a patch for the issue.

Comment 2 errata-xmlrpc 2026-04-01 09:07:14 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:6340 https://access.redhat.com/errata/RHSA-2026:6340

Comment 3 errata-xmlrpc 2026-04-07 06:15:47 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.6 Extended Update Support

Via RHSA-2026:6727 https://access.redhat.com/errata/RHSA-2026:6727

Comment 4 errata-xmlrpc 2026-04-07 07:42:03 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10.0 Extended Update Support

Via RHSA-2026:6743 https://access.redhat.com/errata/RHSA-2026:6743

Comment 5 errata-xmlrpc 2026-04-07 12:19:01 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2026:6799 https://access.redhat.com/errata/RHSA-2026:6799

Comment 6 errata-xmlrpc 2026-04-07 23:04:53 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2026:6918 https://access.redhat.com/errata/RHSA-2026:6918

Comment 7 errata-xmlrpc 2026-04-08 05:09:08 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2026:6958 https://access.redhat.com/errata/RHSA-2026:6958

Comment 8 errata-xmlrpc 2026-04-22 07:45:46 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2026:9640 https://access.redhat.com/errata/RHSA-2026:9640

Comment 9 errata-xmlrpc 2026-04-22 07:48:49 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2026:9641 https://access.redhat.com/errata/RHSA-2026:9641

Comment 10 errata-xmlrpc 2026-04-23 07:15:01 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.8 Telecommunications Update Service

Via RHSA-2026:10076 https://access.redhat.com/errata/RHSA-2026:10076

Comment 12 errata-xmlrpc 2026-04-27 05:36:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support

Via RHSA-2026:10734 https://access.redhat.com/errata/RHSA-2026:10734

Comment 13 errata-xmlrpc 2026-04-27 05:39:05 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On

Via RHSA-2026:10735 https://access.redhat.com/errata/RHSA-2026:10735

Comment 14 errata-xmlrpc 2026-04-27 14:50:31 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2026:10951 https://access.redhat.com/errata/RHSA-2026:10951

Comment 15 errata-xmlrpc 2026-04-28 06:42:42 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Extended Lifecycle Support

Via RHSA-2026:11323 https://access.redhat.com/errata/RHSA-2026:11323