Bug 2442783 (CVE-2026-27951) - CVE-2026-27951 freerdp: FreeRDP: Denial of Service via endless blocking loop in Stream_EnsureCapacity
Summary: CVE-2026-27951 freerdp: FreeRDP: Denial of Service via endless blocking loop ...
Keywords:
Status: NEW
Alias: CVE-2026-27951
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2442800 2442803 2442810 2442801 2442806
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-02-25 22:02 UTC by OSIDB Bzimport
Modified: 2026-05-13 06:48 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2026:16019 0 None None None 2026-05-11 16:18:29 UTC
Red Hat Product Errata RHSA-2026:16482 0 None None None 2026-05-13 00:56:56 UTC
Red Hat Product Errata RHSA-2026:16483 0 None None None 2026-05-12 23:24:41 UTC
Red Hat Product Errata RHSA-2026:16485 0 None None None 2026-05-12 23:24:56 UTC
Red Hat Product Errata RHSA-2026:16777 0 None None None 2026-05-13 04:38:57 UTC
Red Hat Product Errata RHSA-2026:16814 0 None None None 2026-05-13 05:49:46 UTC
Red Hat Product Errata RHSA-2026:16865 0 None None None 2026-05-13 06:48:26 UTC
Red Hat Product Errata RHSA-2026:16866 0 None None None 2026-05-13 06:38:46 UTC

Description OSIDB Bzimport 2026-02-25 22:02:16 UTC
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.23.0, the function `Stream_EnsureCapacity` can create an endless blocking loop. This may affect all client and server implementations using `FreeRDP`. For practical exploitation this will only work on 32bit systems where the available physical memory is `>= SIZE_MAX`. Version 3.23.0 contains a patch. No known workarounds are available.

Comment 2 errata-xmlrpc 2026-05-11 16:18:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2026:16019 https://access.redhat.com/errata/RHSA-2026:16019

Comment 3 errata-xmlrpc 2026-05-12 23:24:40 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2026:16483 https://access.redhat.com/errata/RHSA-2026:16483

Comment 4 errata-xmlrpc 2026-05-12 23:24:56 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2026:16485 https://access.redhat.com/errata/RHSA-2026:16485

Comment 5 errata-xmlrpc 2026-05-13 00:56:55 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:16482 https://access.redhat.com/errata/RHSA-2026:16482

Comment 6 errata-xmlrpc 2026-05-13 04:38:57 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.8 Telecommunications Update Service

Via RHSA-2026:16777 https://access.redhat.com/errata/RHSA-2026:16777

Comment 7 errata-xmlrpc 2026-05-13 05:49:45 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2026:16814 https://access.redhat.com/errata/RHSA-2026:16814

Comment 8 errata-xmlrpc 2026-05-13 06:38:46 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2026:16866 https://access.redhat.com/errata/RHSA-2026:16866

Comment 9 errata-xmlrpc 2026-05-13 06:48:25 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.6 Extended Update Support

Via RHSA-2026:16865 https://access.redhat.com/errata/RHSA-2026:16865


Note You need to log in before you can comment on or make changes to this bug.