Bug 2442768 (CVE-2026-25952) - CVE-2026-25952 freerdp: FreeRDP: Denial of service due to use-after-free vulnerability
Summary: CVE-2026-25952 freerdp: FreeRDP: Denial of service due to use-after-free vuln...
Keywords:
Status: NEW
Alias: CVE-2026-25952
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2442807 2442849 2442857 2442845 2442854
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-02-25 21:05 UTC by OSIDB Bzimport
Modified: 2026-05-20 19:42 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2026:16014 0 None None None 2026-05-11 16:15:25 UTC
Red Hat Product Errata RHSA-2026:16019 0 None None None 2026-05-11 16:18:28 UTC
Red Hat Product Errata RHSA-2026:16482 0 None None None 2026-05-13 00:56:53 UTC
Red Hat Product Errata RHSA-2026:16483 0 None None None 2026-05-12 23:24:39 UTC
Red Hat Product Errata RHSA-2026:16485 0 None None None 2026-05-12 23:24:53 UTC
Red Hat Product Errata RHSA-2026:16777 0 None None None 2026-05-13 04:38:56 UTC
Red Hat Product Errata RHSA-2026:16814 0 None None None 2026-05-13 05:49:49 UTC
Red Hat Product Errata RHSA-2026:16865 0 None None None 2026-05-13 06:48:17 UTC
Red Hat Product Errata RHSA-2026:16866 0 None None None 2026-05-13 06:38:45 UTC
Red Hat Product Errata RHSA-2026:19142 0 None None None 2026-05-19 16:08:51 UTC
Red Hat Product Errata RHSA-2026:19358 0 None None None 2026-05-19 21:40:06 UTC
Red Hat Product Errata RHSA-2026:19811 0 None None None 2026-05-20 19:42:51 UTC

Description OSIDB Bzimport 2026-02-25 21:05:37 UTC
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.23.0, `xf_SetWindowMinMaxInfo` dereferences a freed `xfAppWindow` pointer because `xf_rail_get_window` in `xf_rail_server_min_max_info` returns an unprotected pointer from the `railWindows` hash table, and the main thread can concurrently delete the window (via a window delete order) while the RAIL channel thread is still using the pointer. Version 3.23.0 fixes the issue.

Comment 4 errata-xmlrpc 2026-05-11 16:15:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2026:16014 https://access.redhat.com/errata/RHSA-2026:16014

Comment 5 errata-xmlrpc 2026-05-11 16:18:27 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2026:16019 https://access.redhat.com/errata/RHSA-2026:16019

Comment 6 errata-xmlrpc 2026-05-12 23:24:38 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2026:16483 https://access.redhat.com/errata/RHSA-2026:16483

Comment 7 errata-xmlrpc 2026-05-12 23:24:52 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2026:16485 https://access.redhat.com/errata/RHSA-2026:16485

Comment 8 errata-xmlrpc 2026-05-13 00:56:53 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:16482 https://access.redhat.com/errata/RHSA-2026:16482

Comment 9 errata-xmlrpc 2026-05-13 04:38:55 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.8 Telecommunications Update Service

Via RHSA-2026:16777 https://access.redhat.com/errata/RHSA-2026:16777

Comment 10 errata-xmlrpc 2026-05-13 05:49:48 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2026:16814 https://access.redhat.com/errata/RHSA-2026:16814

Comment 11 errata-xmlrpc 2026-05-13 06:38:44 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2026:16866 https://access.redhat.com/errata/RHSA-2026:16866

Comment 12 errata-xmlrpc 2026-05-13 06:48:16 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.6 Extended Update Support

Via RHSA-2026:16865 https://access.redhat.com/errata/RHSA-2026:16865

Comment 13 errata-xmlrpc 2026-05-19 16:08:50 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2026:19142 https://access.redhat.com/errata/RHSA-2026:19142

Comment 14 errata-xmlrpc 2026-05-19 21:40:05 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:19358 https://access.redhat.com/errata/RHSA-2026:19358

Comment 15 errata-xmlrpc 2026-05-20 19:42:50 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On

Via RHSA-2026:19811 https://access.redhat.com/errata/RHSA-2026:19811


Note You need to log in before you can comment on or make changes to this bug.