Security update for freerdp
| Announcement ID: | SUSE-SU-2026:0345-1 |
|---|---|
| Release Date: | 2026-01-30T07:18:44Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves 18 vulnerabilities can now be installed.
Description:
This update for freerdp fixes the following issues:
- CVE-2025-4478: Fixed initialization of function pointers after resource allocations (bsc#1243109)
- CVE-2026-22851: Fixed RDPGFX ResetGraphics race leading to use-after-free in SDL client (sdl->primary) (bsc#1256717)
- CVE-2026-22852: Fixed heap-buffer-overflow in audin_process_formats (bsc#1256718)
- CVE-2026-22853: Fixed heap-buffer-overflow in ndr_read_uint8Array (bsc#1256719)
- CVE-2026-22854: Fixed heap-buffer-overflow in drive_process_irp_read (bsc#1256720)
- CVE-2026-22855: Fixed heap-buffer-overflow in smartcard_unpack_set_attrib_call (bsc#1256721)
- CVE-2026-22856: Fixed heap-use-after-free in create_irp_thread (bsc#1256722)
- CVE-2026-22857: Fixed heap-use-after-free in irp_thread_func (bsc#1256723)
- CVE-2026-22858: Fixed global-buffer-overflow in crypto_base64_devoce (bsc#1256724)
- CVE-2026-22859: Fixed heap-buffer-overflow in urb_select_configuration (bsc#1256725)
- CVE-2026-23530: Fixed improper validation leading to heap buffer overflow
in
planar_decompress_plane_rle(bsc#1256940) - CVE-2026-23531: Fixed improper validation in
clear_decompressleading to heap buffer overflow (bsc#1256941) - CVE-2026-23532: Fixed mismatch between destination rectangle clamping and
the actual copy size leading to heap buffer overflow in
gdi_SurfaceToSurface(bsc#1256942) - CVE-2026-23533: Fixed improper validation leading to heap buffer overflow in
clear_decompress_residual_data(bsc#1256943) - CVE-2026-23534: Fixed missing checks leading to heap buffer overflow in
clear_deceompress_bands_data(bsc#1256944) - CVE-2026-23732: Fixed improper validation leading to heap buffer overflow in
Glyph_alloc(bsc#1256945) - CVE-2026-23883: Fixed use-after-free when
update_pointer_colorandfreerdp_image_copy_fromPointer_datafail (bsc#1256946) - CVE-2026-23884: Fixed use-after-free in
gdi_set_bounds(bsc#1256947)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-345=1 -
SUSE Linux Enterprise Workstation Extension 15 SP7
zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2026-345=1
Package List:
-
SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x)
- libuwac0-0-3.10.3-150700.3.3.1
- freerdp-wayland-3.10.3-150700.3.3.1
- freerdp-debuginfo-3.10.3-150700.3.3.1
- freerdp-debugsource-3.10.3-150700.3.3.1
- freerdp-3.10.3-150700.3.3.1
- freerdp-server-3.10.3-150700.3.3.1
- freerdp-server-debuginfo-3.10.3-150700.3.3.1
- libuwac0-0-debuginfo-3.10.3-150700.3.3.1
- freerdp-wayland-debuginfo-3.10.3-150700.3.3.1
- freerdp-proxy-3.10.3-150700.3.3.1
- freerdp-proxy-debuginfo-3.10.3-150700.3.3.1
- freerdp-devel-3.10.3-150700.3.3.1
-
SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64)
- freerdp-proxy-plugins-debuginfo-3.10.3-150700.3.3.1
- librdtk0-0-debuginfo-3.10.3-150700.3.3.1
- freerdp-proxy-plugins-3.10.3-150700.3.3.1
- freerdp-sdl-3.10.3-150700.3.3.1
- freerdp-server-3.10.3-150700.3.3.1
- freerdp-sdl-debuginfo-3.10.3-150700.3.3.1
- freerdp-proxy-debuginfo-3.10.3-150700.3.3.1
- libfreerdp-server-proxy3-3-3.10.3-150700.3.3.1
- libwinpr3-3-3.10.3-150700.3.3.1
- freerdp-debuginfo-3.10.3-150700.3.3.1
- freerdp-3.10.3-150700.3.3.1
- libwinpr3-3-debuginfo-3.10.3-150700.3.3.1
- winpr-devel-3.10.3-150700.3.3.1
- freerdp-server-debuginfo-3.10.3-150700.3.3.1
- libfreerdp3-3-debuginfo-3.10.3-150700.3.3.1
- freerdp-devel-3.10.3-150700.3.3.1
- libfreerdp-server-proxy3-3-debuginfo-3.10.3-150700.3.3.1
- freerdp-debugsource-3.10.3-150700.3.3.1
- freerdp-proxy-3.10.3-150700.3.3.1
- libfreerdp3-3-3.10.3-150700.3.3.1
- librdtk0-0-3.10.3-150700.3.3.1
References:
- https://www.suse.com/security/cve/CVE-2025-4478.html
- https://www.suse.com/security/cve/CVE-2026-22851.html
- https://www.suse.com/security/cve/CVE-2026-22852.html
- https://www.suse.com/security/cve/CVE-2026-22853.html
- https://www.suse.com/security/cve/CVE-2026-22854.html
- https://www.suse.com/security/cve/CVE-2026-22855.html
- https://www.suse.com/security/cve/CVE-2026-22856.html
- https://www.suse.com/security/cve/CVE-2026-22857.html
- https://www.suse.com/security/cve/CVE-2026-22858.html
- https://www.suse.com/security/cve/CVE-2026-22859.html
- https://www.suse.com/security/cve/CVE-2026-23530.html
- https://www.suse.com/security/cve/CVE-2026-23531.html
- https://www.suse.com/security/cve/CVE-2026-23532.html
- https://www.suse.com/security/cve/CVE-2026-23533.html
- https://www.suse.com/security/cve/CVE-2026-23534.html
- https://www.suse.com/security/cve/CVE-2026-23732.html
- https://www.suse.com/security/cve/CVE-2026-23883.html
- https://www.suse.com/security/cve/CVE-2026-23884.html
- https://bugzilla.suse.com/show_bug.cgi?id=1243109
- https://bugzilla.suse.com/show_bug.cgi?id=1256717
- https://bugzilla.suse.com/show_bug.cgi?id=1256718
- https://bugzilla.suse.com/show_bug.cgi?id=1256719
- https://bugzilla.suse.com/show_bug.cgi?id=1256720
- https://bugzilla.suse.com/show_bug.cgi?id=1256721
- https://bugzilla.suse.com/show_bug.cgi?id=1256722
- https://bugzilla.suse.com/show_bug.cgi?id=1256723
- https://bugzilla.suse.com/show_bug.cgi?id=1256724
- https://bugzilla.suse.com/show_bug.cgi?id=1256725
- https://bugzilla.suse.com/show_bug.cgi?id=1256940
- https://bugzilla.suse.com/show_bug.cgi?id=1256941
- https://bugzilla.suse.com/show_bug.cgi?id=1256942
- https://bugzilla.suse.com/show_bug.cgi?id=1256943
- https://bugzilla.suse.com/show_bug.cgi?id=1256944
- https://bugzilla.suse.com/show_bug.cgi?id=1256945
- https://bugzilla.suse.com/show_bug.cgi?id=1256946
- https://bugzilla.suse.com/show_bug.cgi?id=1256947