Bug 2447386 (CVE-2026-31883) - CVE-2026-31883 freerdp: FreeRDP: Denial of Service via crafted audio data in RDP
Summary: CVE-2026-31883 freerdp: FreeRDP: Denial of Service via crafted audio data in RDP
Keywords:
Status: NEW
Alias: CVE-2026-31883
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2447411 2447413 2447412
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-03-13 18:04 UTC by OSIDB Bzimport
Modified: 2026-05-19 21:40 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2026:16014 0 None None None 2026-05-11 16:15:30 UTC
Red Hat Product Errata RHSA-2026:16019 0 None None None 2026-05-11 16:18:34 UTC
Red Hat Product Errata RHSA-2026:16482 0 None None None 2026-05-13 00:57:00 UTC
Red Hat Product Errata RHSA-2026:16483 0 None None None 2026-05-12 23:24:45 UTC
Red Hat Product Errata RHSA-2026:16485 0 None None None 2026-05-12 23:25:00 UTC
Red Hat Product Errata RHSA-2026:16777 0 None None None 2026-05-13 04:39:02 UTC
Red Hat Product Errata RHSA-2026:16814 0 None None None 2026-05-13 05:49:43 UTC
Red Hat Product Errata RHSA-2026:16865 0 None None None 2026-05-13 06:48:23 UTC
Red Hat Product Errata RHSA-2026:16866 0 None None None 2026-05-13 06:38:51 UTC
Red Hat Product Errata RHSA-2026:19142 0 None None None 2026-05-19 16:08:58 UTC
Red Hat Product Errata RHSA-2026:19358 0 None None None 2026-05-19 21:40:14 UTC

Description OSIDB Bzimport 2026-03-13 18:04:24 UTC
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0, a size_t underflow in the IMA-ADPCM and MS-ADPCM audio decoders leads to heap-buffer-overflow write via the RDPSND audio channel. In libfreerdp/codec/dsp.c, the IMA-ADPCM and MS-ADPCM decoders subtract block header sizes from a size_t variable without checking for underflow. When nBlockAlign (received from the server) is set such that size % block_size == 0 triggers the header parsing at a point where size is smaller than the header (4 or 8 bytes), the subtraction wraps size to ~SIZE_MAX. The while (size > 0) loop then continues for an astronomical number of iterations. This vulnerability is fixed in 3.24.0.

Comment 2 errata-xmlrpc 2026-05-11 16:15:29 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2026:16014 https://access.redhat.com/errata/RHSA-2026:16014

Comment 3 errata-xmlrpc 2026-05-11 16:18:33 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2026:16019 https://access.redhat.com/errata/RHSA-2026:16019

Comment 4 errata-xmlrpc 2026-05-12 23:24:44 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2026:16483 https://access.redhat.com/errata/RHSA-2026:16483

Comment 5 errata-xmlrpc 2026-05-12 23:24:59 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2026:16485 https://access.redhat.com/errata/RHSA-2026:16485

Comment 6 errata-xmlrpc 2026-05-13 00:56:59 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:16482 https://access.redhat.com/errata/RHSA-2026:16482

Comment 7 errata-xmlrpc 2026-05-13 04:39:01 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.8 Telecommunications Update Service

Via RHSA-2026:16777 https://access.redhat.com/errata/RHSA-2026:16777

Comment 8 errata-xmlrpc 2026-05-13 05:49:42 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2026:16814 https://access.redhat.com/errata/RHSA-2026:16814

Comment 9 errata-xmlrpc 2026-05-13 06:38:50 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2026:16866 https://access.redhat.com/errata/RHSA-2026:16866

Comment 10 errata-xmlrpc 2026-05-13 06:48:23 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.6 Extended Update Support

Via RHSA-2026:16865 https://access.redhat.com/errata/RHSA-2026:16865

Comment 11 errata-xmlrpc 2026-05-19 16:08:58 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2026:19142 https://access.redhat.com/errata/RHSA-2026:19142

Comment 12 errata-xmlrpc 2026-05-19 21:40:13 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:19358 https://access.redhat.com/errata/RHSA-2026:19358


Note You need to log in before you can comment on or make changes to this bug.