Bug 2453219 (CVE-2026-33984) - CVE-2026-33984 FreeRDP: FreeRDP: Heap buffer overflow allows arbitrary code execution via crafted pixel data
Summary: CVE-2026-33984 FreeRDP: FreeRDP: Heap buffer overflow allows arbitrary code e...
Keywords:
Status: NEW
Alias: CVE-2026-33984
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2453241 2453243 2453242
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-03-30 22:01 UTC by OSIDB Bzimport
Modified: 2026-05-19 21:37 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2026:10709 0 None None None 2026-04-27 02:06:00 UTC
Red Hat Product Errata RHSA-2026:11332 0 None None None 2026-04-28 07:36:29 UTC
Red Hat Product Errata RHSA-2026:11333 0 None None None 2026-04-28 07:37:52 UTC
Red Hat Product Errata RHSA-2026:11336 0 None None None 2026-04-28 07:48:26 UTC
Red Hat Product Errata RHSA-2026:11649 0 None None None 2026-04-29 11:28:25 UTC
Red Hat Product Errata RHSA-2026:11651 0 None None None 2026-04-29 11:25:21 UTC
Red Hat Product Errata RHSA-2026:12359 0 None None None 2026-04-30 17:49:13 UTC
Red Hat Product Errata RHSA-2026:12388 0 None None None 2026-04-30 16:48:40 UTC
Red Hat Product Errata RHSA-2026:19033 0 None None None 2026-05-19 13:05:29 UTC
Red Hat Product Errata RHSA-2026:19349 0 None None None 2026-05-19 21:37:25 UTC
Red Hat Product Errata RHSA-2026:8457 0 None None None 2026-04-16 13:12:36 UTC
Red Hat Product Errata RHSA-2026:8458 0 None None None 2026-04-16 12:45:14 UTC
Red Hat Product Errata RHSA-2026:8945 0 None None None 2026-04-20 11:21:23 UTC
Red Hat Product Errata RHSA-2026:9656 0 None None None 2026-04-22 09:37:06 UTC

Description OSIDB Bzimport 2026-03-30 22:01:48 UTC
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.24.2, in resize_vbar_entry() in libfreerdp/codec/clear.c, vBarEntry->size is updated to vBarEntry->count before the winpr_aligned_recalloc() call. If realloc fails, size is inflated while pixels still points to the old, smaller buffer. On a subsequent call where count <= size (the inflated value), realloc is skipped. The caller then writes count * bpp bytes of attacker-controlled pixel data into the undersized buffer, causing a heap buffer overflow. This issue has been patched in version 3.24.2.

Comment 2 errata-xmlrpc 2026-04-16 12:45:13 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2026:8458 https://access.redhat.com/errata/RHSA-2026:8458

Comment 3 errata-xmlrpc 2026-04-16 13:12:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:8457 https://access.redhat.com/errata/RHSA-2026:8457

Comment 4 errata-xmlrpc 2026-04-20 11:21:22 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2026:8945 https://access.redhat.com/errata/RHSA-2026:8945

Comment 5 errata-xmlrpc 2026-04-22 09:37:05 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.6 Extended Update Support

Via RHSA-2026:9656 https://access.redhat.com/errata/RHSA-2026:9656

Comment 6 errata-xmlrpc 2026-04-27 02:05:59 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2026:10709 https://access.redhat.com/errata/RHSA-2026:10709

Comment 7 errata-xmlrpc 2026-04-28 07:36:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2026:11332 https://access.redhat.com/errata/RHSA-2026:11332

Comment 8 errata-xmlrpc 2026-04-28 07:37:51 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10.0 Extended Update Support

Via RHSA-2026:11333 https://access.redhat.com/errata/RHSA-2026:11333

Comment 9 errata-xmlrpc 2026-04-28 07:48:25 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2026:11336 https://access.redhat.com/errata/RHSA-2026:11336

Comment 10 errata-xmlrpc 2026-04-29 11:25:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support

Via RHSA-2026:11651 https://access.redhat.com/errata/RHSA-2026:11651

Comment 11 errata-xmlrpc 2026-04-29 11:28:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On

Via RHSA-2026:11649 https://access.redhat.com/errata/RHSA-2026:11649

Comment 12 errata-xmlrpc 2026-04-30 16:48:39 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2026:12388 https://access.redhat.com/errata/RHSA-2026:12388

Comment 13 errata-xmlrpc 2026-04-30 17:49:10 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.8 Telecommunications Update Service

Via RHSA-2026:12359 https://access.redhat.com/errata/RHSA-2026:12359

Comment 14 errata-xmlrpc 2026-05-19 13:05:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2026:19033 https://access.redhat.com/errata/RHSA-2026:19033

Comment 15 errata-xmlrpc 2026-05-19 21:37:25 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:19349 https://access.redhat.com/errata/RHSA-2026:19349


Note You need to log in before you can comment on or make changes to this bug.