Bug 2430891 (CVE-2026-23532)

Summary: CVE-2026-23532 freerdp: FreeRDP: Denial of Service and potential code execution via client-side heap buffer overflow
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in FreeRDP. A malicious server can exploit a client-side heap buffer overflow vulnerability in the `gdi_SurfaceToSurface` path. This vulnerability, caused by a mismatch in memory handling, can lead to a crash (Denial of Service) of the client application. Furthermore, it carries a risk of heap corruption, which could potentially enable arbitrary code execution on the affected system.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2430894, 2430896, 2430898, 2430895, 2430897    
Bug Blocks:    

Description OSIDB Bzimport 2026-01-19 18:02:38 UTC
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, a client-side heap buffer overflow occurs in the  FreeRDP client’s `gdi_SurfaceToSurface` path due to a mismatch between destination rectangle clamping and the actual copy size. A malicious server can trigger a client‑side heap buffer overflow, causing a crash (DoS) and potential heap corruption with code‑execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.

Comment 2 errata-xmlrpc 2026-02-05 10:19:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:2048 https://access.redhat.com/errata/RHSA-2026:2048

Comment 3 errata-xmlrpc 2026-02-05 11:43:45 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2026:2081 https://access.redhat.com/errata/RHSA-2026:2081

Comment 4 errata-xmlrpc 2026-02-09 01:33:59 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2026:2222 https://access.redhat.com/errata/RHSA-2026:2222

Comment 5 errata-xmlrpc 2026-02-16 11:38:32 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Extended Lifecycle Support

Via RHSA-2026:2714 https://access.redhat.com/errata/RHSA-2026:2714

Comment 6 errata-xmlrpc 2026-02-16 13:05:05 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2026:2736 https://access.redhat.com/errata/RHSA-2026:2736

Comment 7 errata-xmlrpc 2026-02-17 03:25:41 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2026:2770 https://access.redhat.com/errata/RHSA-2026:2770

Comment 8 errata-xmlrpc 2026-02-17 15:55:59 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2026:2824 https://access.redhat.com/errata/RHSA-2026:2824

Comment 9 errata-xmlrpc 2026-02-18 14:30:23 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10.0 Extended Update Support

Via RHSA-2026:2952 https://access.redhat.com/errata/RHSA-2026:2952

Comment 10 errata-xmlrpc 2026-02-23 01:32:42 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On

Via RHSA-2026:3038 https://access.redhat.com/errata/RHSA-2026:3038

Comment 11 errata-xmlrpc 2026-02-23 01:33:33 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support

Via RHSA-2026:3039 https://access.redhat.com/errata/RHSA-2026:3039

Comment 12 errata-xmlrpc 2026-02-23 01:38:57 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2026:3036 https://access.redhat.com/errata/RHSA-2026:3036

Comment 13 errata-xmlrpc 2026-02-23 01:42:22 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.8 Telecommunications Update Service

Via RHSA-2026:3041 https://access.redhat.com/errata/RHSA-2026:3041

Comment 14 errata-xmlrpc 2026-02-23 01:50:23 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.6 Extended Update Support

Via RHSA-2026:3037 https://access.redhat.com/errata/RHSA-2026:3037