Security update for freerdp
| Announcement ID: | SUSE-SU-2026:1633-1 |
|---|---|
| Release Date: | 2026-04-27T12:05:31Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves 17 vulnerabilities and contains one feature can now be installed.
Description:
This update for freerdp fixes the following issues:
- CVE-2026-25941: Out-of-Bounds Read in client RDPGFX channel via crafted
WIRE_TO_SURFACE_2PDU (bsc#1258919). - CVE-2026-25942: Global-buffer-overflow in
xf_rail_server_execute_result(bsc#1258920). - CVE-2026-25952: Heap-use-after-free in
xf_SetWindowMinMaxInfo(bsc#1258921). - CVE-2026-25953: Heap-use-after-free in
xf_AppUpdateWindowFromSurface(bsc#1258923). - CVE-2026-25954: Heap-use-after-free in
xf_rail_server_local_move_size(bsc#1258924). - CVE-2026-25955: Heap-use-after-free in
xf_AppUpdateWindowFromSurface(bsc#1258973). - CVE-2026-25959: Heap-use-after-free in
xf_cliprdr_provide_data_(bsc#1258976). - CVE-2026-25997: Heap-use-after-free in
xf_clipboard_format_equal(bsc#1258977). - CVE-2026-26986: Heap-use-after-free in
rail_window_free(bsc#1258967). - CVE-2026-27015: Smartcard NDR alignment padding triggers reachable
WINPR_ASSERTabort (bsc#1258987). - CVE-2026-27950: Denial of service due to incomplete fix for heap-use-after-free vulnerability (bsc#1258941).
- CVE-2026-27951: Denial of service via endless blocking loop in
Stream_EnsureCapacity(bsc#1258939). - CVE-2026-29774: Missing bounds validation can cause a client-side heap buffer overflow (bsc#1259689).
- CVE-2026-29775: Malicious server can trigger a client-side heap out-of-bounds access (bsc#1259684).
- CVE-2026-29776: Missing length check can lead to an integer underflow (bsc#1259692).
- CVE-2026-31897: Missing length check can cause an out-of-bounds read (bsc#1259693).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-1633=1 -
SUSE Linux Enterprise Workstation Extension 15 SP7
zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2026-1633=1
Package List:
-
SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x)
- freerdp-wayland-debuginfo-3.10.3-150700.3.14.1
- freerdp-proxy-3.10.3-150700.3.14.1
- freerdp-proxy-debuginfo-3.10.3-150700.3.14.1
- freerdp-wayland-3.10.3-150700.3.14.1
- freerdp-debuginfo-3.10.3-150700.3.14.1
- freerdp-server-debuginfo-3.10.3-150700.3.14.1
- libuwac0-0-3.10.3-150700.3.14.1
- freerdp-debugsource-3.10.3-150700.3.14.1
- libuwac0-0-debuginfo-3.10.3-150700.3.14.1
- freerdp-devel-3.10.3-150700.3.14.1
- freerdp-3.10.3-150700.3.14.1
- freerdp-server-3.10.3-150700.3.14.1
-
SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64)
- libfreerdp3-3-3.10.3-150700.3.14.1
- freerdp-proxy-3.10.3-150700.3.14.1
- libfreerdp3-3-debuginfo-3.10.3-150700.3.14.1
- freerdp-server-3.10.3-150700.3.14.1
- librdtk0-0-3.10.3-150700.3.14.1
- freerdp-sdl-debuginfo-3.10.3-150700.3.14.1
- freerdp-proxy-plugins-3.10.3-150700.3.14.1
- freerdp-debugsource-3.10.3-150700.3.14.1
- freerdp-devel-3.10.3-150700.3.14.1
- freerdp-3.10.3-150700.3.14.1
- libfreerdp-server-proxy3-3-3.10.3-150700.3.14.1
- freerdp-proxy-debuginfo-3.10.3-150700.3.14.1
- freerdp-debuginfo-3.10.3-150700.3.14.1
- libfreerdp-server-proxy3-3-debuginfo-3.10.3-150700.3.14.1
- winpr-devel-3.10.3-150700.3.14.1
- freerdp-server-debuginfo-3.10.3-150700.3.14.1
- libwinpr3-3-debuginfo-3.10.3-150700.3.14.1
- freerdp-proxy-plugins-debuginfo-3.10.3-150700.3.14.1
- librdtk0-0-debuginfo-3.10.3-150700.3.14.1
- freerdp-sdl-3.10.3-150700.3.14.1
- libwinpr3-3-3.10.3-150700.3.14.1
References:
- https://www.suse.com/security/cve/CVE-2026-25941.html
- https://www.suse.com/security/cve/CVE-2026-25942.html
- https://www.suse.com/security/cve/CVE-2026-25952.html
- https://www.suse.com/security/cve/CVE-2026-25953.html
- https://www.suse.com/security/cve/CVE-2026-25954.html
- https://www.suse.com/security/cve/CVE-2026-25955.html
- https://www.suse.com/security/cve/CVE-2026-25959.html
- https://www.suse.com/security/cve/CVE-2026-25997.html
- https://www.suse.com/security/cve/CVE-2026-26986.html
- https://www.suse.com/security/cve/CVE-2026-27015.html
- https://www.suse.com/security/cve/CVE-2026-27950.html
- https://www.suse.com/security/cve/CVE-2026-27951.html
- https://www.suse.com/security/cve/CVE-2026-29774.html
- https://www.suse.com/security/cve/CVE-2026-29775.html
- https://www.suse.com/security/cve/CVE-2026-29776.html
- https://www.suse.com/security/cve/CVE-2026-31884.html
- https://www.suse.com/security/cve/CVE-2026-31897.html
- https://bugzilla.suse.com/show_bug.cgi?id=1258919
- https://bugzilla.suse.com/show_bug.cgi?id=1258920
- https://bugzilla.suse.com/show_bug.cgi?id=1258921
- https://bugzilla.suse.com/show_bug.cgi?id=1258923
- https://bugzilla.suse.com/show_bug.cgi?id=1258924
- https://bugzilla.suse.com/show_bug.cgi?id=1258939
- https://bugzilla.suse.com/show_bug.cgi?id=1258941
- https://bugzilla.suse.com/show_bug.cgi?id=1258967
- https://bugzilla.suse.com/show_bug.cgi?id=1258973
- https://bugzilla.suse.com/show_bug.cgi?id=1258976
- https://bugzilla.suse.com/show_bug.cgi?id=1258977
- https://bugzilla.suse.com/show_bug.cgi?id=1258987
- https://bugzilla.suse.com/show_bug.cgi?id=1259680
- https://bugzilla.suse.com/show_bug.cgi?id=1259684
- https://bugzilla.suse.com/show_bug.cgi?id=1259689
- https://bugzilla.suse.com/show_bug.cgi?id=1259692
- https://bugzilla.suse.com/show_bug.cgi?id=1259693
- https://jira.suse.com/browse/PED-13439