Bug 2430886 (CVE-2026-23533)

Summary: CVE-2026-23533 freerdp: FreeRDP: Heap buffer overflow leads to denial of service and potential code execution
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in FreeRDP, a free implementation of the Remote Desktop Protocol. A malicious server can exploit a client-side heap buffer overflow vulnerability in the RDPGFX ClearCodec decode path. This occurs when maliciously crafted residual data causes out-of-bounds writes during color output. Successful exploitation can lead to a crash, resulting in a Denial of Service (DoS), and potentially heap corruption with a risk of arbitrary code execution.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2430910, 2430912, 2430914, 2430911, 2430913    
Bug Blocks:    

Description OSIDB Bzimport 2026-01-19 18:02:13 UTC
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, a client-side heap buffer overflow occurs in the RDPGFX ClearCodec decode path when maliciously crafted residual data causes out-of-bounds writes during color output. A malicious server can trigger a client‑side heap buffer overflow, causing a crash (DoS) and potential heap corruption with code‑execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.

Comment 2 errata-xmlrpc 2026-02-05 10:19:31 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:2048 https://access.redhat.com/errata/RHSA-2026:2048

Comment 3 errata-xmlrpc 2026-02-05 11:43:41 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2026:2081 https://access.redhat.com/errata/RHSA-2026:2081

Comment 4 errata-xmlrpc 2026-02-09 01:33:56 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2026:2222 https://access.redhat.com/errata/RHSA-2026:2222

Comment 5 errata-xmlrpc 2026-02-16 11:38:37 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Extended Lifecycle Support

Via RHSA-2026:2714 https://access.redhat.com/errata/RHSA-2026:2714

Comment 6 errata-xmlrpc 2026-02-16 13:05:14 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2026:2736 https://access.redhat.com/errata/RHSA-2026:2736

Comment 7 errata-xmlrpc 2026-02-17 03:25:40 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2026:2770 https://access.redhat.com/errata/RHSA-2026:2770

Comment 8 errata-xmlrpc 2026-02-17 15:55:56 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2026:2824 https://access.redhat.com/errata/RHSA-2026:2824

Comment 9 errata-xmlrpc 2026-02-18 14:30:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10.0 Extended Update Support

Via RHSA-2026:2952 https://access.redhat.com/errata/RHSA-2026:2952

Comment 10 errata-xmlrpc 2026-02-23 01:32:47 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On

Via RHSA-2026:3038 https://access.redhat.com/errata/RHSA-2026:3038

Comment 11 errata-xmlrpc 2026-02-23 01:33:31 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support

Via RHSA-2026:3039 https://access.redhat.com/errata/RHSA-2026:3039

Comment 12 errata-xmlrpc 2026-02-23 01:38:54 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2026:3036 https://access.redhat.com/errata/RHSA-2026:3036

Comment 13 errata-xmlrpc 2026-02-23 01:42:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.8 Telecommunications Update Service

Via RHSA-2026:3041 https://access.redhat.com/errata/RHSA-2026:3041

Comment 14 errata-xmlrpc 2026-02-23 01:50:19 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.6 Extended Update Support

Via RHSA-2026:3037 https://access.redhat.com/errata/RHSA-2026:3037