Security update for freerdp2
| Announcement ID: | SUSE-SU-2026:0449-1 |
|---|---|
| Release Date: | 2026-02-11T14:53:56Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves eight vulnerabilities can now be installed.
Description:
This update for freerdp2 fixes the following issues:
- CVE-2026-22852: a malicious RDP server can trigger a heap-buffer-overflow in audin_process_formats (bsc#1256718).
- CVE-2026-22854: server-controlled read length is used to read file data into an IRP output can cause heap-buffer-overflow in drive_process_irp_read (bsc#1256720).
- CVE-2026-22856: race condition in the serial channel IRP thread tracking can cause heap-use-after-free in create_irp_thread(bsc#1256722).
- CVE-2026-22859: improper bound check can lead to heap-buffer-overflow in urb_select_configuration (bsc#1256725).
- CVE-2026-23530: improper validation can lead to heap buffer overflow in
planar_decompress_plane_rle(bsc#1256940). - CVE-2026-23531: improper validation in
clear_decompresscan lead to heap buffer overflow (bsc#1256941). - CVE-2026-23532: mismatch between destination rectangle clamping and the actual copy size can lead to a heap buffer
overflow in
gdi_SurfaceToSurface(bsc#1256942). - CVE-2026-23534: missing checks can lead to heap buffer overflow in
clear_decompress_bands_data(bsc#1256944).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-449=1 -
SUSE Linux Enterprise Workstation Extension 15 SP7
zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2026-449=1
Package List:
-
SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x)
- winpr2-devel-2.11.7-150700.3.3.1
- freerdp2-debugsource-2.11.7-150700.3.3.1
- freerdp2-debuginfo-2.11.7-150700.3.3.1
-
SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64)
- libwinpr2-2-debuginfo-2.11.7-150700.3.3.1
- libwinpr2-2-2.11.7-150700.3.3.1
- freerdp2-2.11.7-150700.3.3.1
- freerdp2-server-2.11.7-150700.3.3.1
- freerdp2-debuginfo-2.11.7-150700.3.3.1
- libfreerdp2-2-2.11.7-150700.3.3.1
- freerdp2-proxy-debuginfo-2.11.7-150700.3.3.1
- winpr2-devel-2.11.7-150700.3.3.1
- freerdp2-server-debuginfo-2.11.7-150700.3.3.1
- freerdp2-devel-2.11.7-150700.3.3.1
- libfreerdp2-2-debuginfo-2.11.7-150700.3.3.1
- freerdp2-debugsource-2.11.7-150700.3.3.1
- freerdp2-proxy-2.11.7-150700.3.3.1
References:
- https://www.suse.com/security/cve/CVE-2026-22852.html
- https://www.suse.com/security/cve/CVE-2026-22854.html
- https://www.suse.com/security/cve/CVE-2026-22856.html
- https://www.suse.com/security/cve/CVE-2026-22859.html
- https://www.suse.com/security/cve/CVE-2026-23530.html
- https://www.suse.com/security/cve/CVE-2026-23531.html
- https://www.suse.com/security/cve/CVE-2026-23532.html
- https://www.suse.com/security/cve/CVE-2026-23534.html
- https://bugzilla.suse.com/show_bug.cgi?id=1256718
- https://bugzilla.suse.com/show_bug.cgi?id=1256720
- https://bugzilla.suse.com/show_bug.cgi?id=1256722
- https://bugzilla.suse.com/show_bug.cgi?id=1256725
- https://bugzilla.suse.com/show_bug.cgi?id=1256940
- https://bugzilla.suse.com/show_bug.cgi?id=1256941
- https://bugzilla.suse.com/show_bug.cgi?id=1256942
- https://bugzilla.suse.com/show_bug.cgi?id=1256944