FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a malicious RDP server can trigger a heap-buffer-overflow write in the FreeRDP client when processing Audio Input (AUDIN) format lists. audin_process_formats reuses callback->formats_count across multiple MSG_SNDIN_FORMATS PDUs and writes past the newly allocated formats array, causing memory corruption and a crash. This vulnerability is fixed in 3.20.1.
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2026:6340 https://access.redhat.com/errata/RHSA-2026:6340
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.6 Extended Update Support Via RHSA-2026:6727 https://access.redhat.com/errata/RHSA-2026:6727
This issue has been addressed in the following products: Red Hat Enterprise Linux 10.0 Extended Update Support Via RHSA-2026:6743 https://access.redhat.com/errata/RHSA-2026:6743
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2026:6799 https://access.redhat.com/errata/RHSA-2026:6799
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2026:6918 https://access.redhat.com/errata/RHSA-2026:6918
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2026:6958 https://access.redhat.com/errata/RHSA-2026:6958