Bug 2430888 (CVE-2026-23534)
| Summary: | CVE-2026-23534 freerdp: FreeRDP: Arbitrary code execution and denial of service via client-side heap buffer overflow | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
| Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
| Status: | NEW --- | QA Contact: | |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | unspecified | Keywords: | Security |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | --- | |
| Doc Text: |
A flaw was found in FreeRDP, a free implementation of the Remote Desktop Protocol. A malicious server can trigger a client-side heap buffer overflow in the ClearCodec bands decode path. This vulnerability, caused by crafted band coordinates, allows writes past the end of the destination surface buffer. Successful exploitation can lead to a crash, resulting in a denial of service (DoS), and potentially arbitrary code execution.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2430899, 2430901, 2430903, 2430900, 2430902 | ||
| Bug Blocks: | |||
|
Description
OSIDB Bzimport
2026-01-19 18:02:22 UTC
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2026:2048 https://access.redhat.com/errata/RHSA-2026:2048 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2026:2081 https://access.redhat.com/errata/RHSA-2026:2081 This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2026:2222 https://access.redhat.com/errata/RHSA-2026:2222 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2026:2736 https://access.redhat.com/errata/RHSA-2026:2736 This issue has been addressed in the following products: Red Hat Enterprise Linux 10.0 Extended Update Support Via RHSA-2026:2952 https://access.redhat.com/errata/RHSA-2026:2952 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.6 Extended Update Support Via RHSA-2026:3037 https://access.redhat.com/errata/RHSA-2026:3037 |