Security update for freerdp
| Announcement ID: | SUSE-SU-2026:0421-1 |
|---|---|
| Release Date: | 2026-02-10T15:28:57Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves eight vulnerabilities can now be installed.
Description:
This update for freerdp fixes the following issues:
- CVE-2026-22852: a malicious RDP server can trigger a heap-buffer-overflow in audin_process_formats (bsc#1256718).
- CVE-2026-22854: server-controlled read length is used to read file data into an IRP output can cause heap-buffer-overflow in drive_process_irp_read (bsc#1256720).
- CVE-2026-22856: race condition in the serial channel IRP thread tracking can cause heap-use-after-free in create_irp_thread(bsc#1256722).
- CVE-2026-22859: improper bound check can lead to heap-buffer-overflow in urb_select_configuration (bsc#1256725).
- CVE-2026-23530: improper validation can lead to heap buffer overflow in
planar_decompress_plane_rle(bsc#1256940). - CVE-2026-23531: improper validation in
clear_decompresscan lead to heap buffer overflow (bsc#1256941). - CVE-2026-23532: mismatch between destination rectangle clamping and the actual copy size can lead to a heap buffer
overflow in
gdi_SurfaceToSurface(bsc#1256942). - CVE-2026-23534: missing checks can lead to heap buffer overflow in
clear_decompress_bands_data(bsc#1256944).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-421=1 -
openSUSE Leap 15.4
zypper in -t patch SUSE-2026-421=1
Package List:
-
SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x)
- libwinpr2-2.4.0-150400.3.35.1
- freerdp-debugsource-2.4.0-150400.3.35.1
- libfreerdp2-2.4.0-150400.3.35.1
- libfreerdp2-debuginfo-2.4.0-150400.3.35.1
- libwinpr2-debuginfo-2.4.0-150400.3.35.1
- freerdp-debuginfo-2.4.0-150400.3.35.1
-
openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
- freerdp-wayland-debuginfo-2.4.0-150400.3.35.1
- freerdp-2.4.0-150400.3.35.1
- winpr2-devel-2.4.0-150400.3.35.1
- libwinpr2-2.4.0-150400.3.35.1
- freerdp-debugsource-2.4.0-150400.3.35.1
- libfreerdp2-2.4.0-150400.3.35.1
- freerdp-server-debuginfo-2.4.0-150400.3.35.1
- libfreerdp2-debuginfo-2.4.0-150400.3.35.1
- freerdp-proxy-2.4.0-150400.3.35.1
- libwinpr2-debuginfo-2.4.0-150400.3.35.1
- freerdp-proxy-debuginfo-2.4.0-150400.3.35.1
- freerdp-debuginfo-2.4.0-150400.3.35.1
- freerdp-devel-2.4.0-150400.3.35.1
- freerdp-server-2.4.0-150400.3.35.1
- freerdp-wayland-2.4.0-150400.3.35.1
- libuwac0-0-2.4.0-150400.3.35.1
- uwac0-0-devel-2.4.0-150400.3.35.1
- libuwac0-0-debuginfo-2.4.0-150400.3.35.1
References:
- https://www.suse.com/security/cve/CVE-2026-22852.html
- https://www.suse.com/security/cve/CVE-2026-22854.html
- https://www.suse.com/security/cve/CVE-2026-22856.html
- https://www.suse.com/security/cve/CVE-2026-22859.html
- https://www.suse.com/security/cve/CVE-2026-23530.html
- https://www.suse.com/security/cve/CVE-2026-23531.html
- https://www.suse.com/security/cve/CVE-2026-23532.html
- https://www.suse.com/security/cve/CVE-2026-23534.html
- https://bugzilla.suse.com/show_bug.cgi?id=1256718
- https://bugzilla.suse.com/show_bug.cgi?id=1256720
- https://bugzilla.suse.com/show_bug.cgi?id=1256722
- https://bugzilla.suse.com/show_bug.cgi?id=1256725
- https://bugzilla.suse.com/show_bug.cgi?id=1256940
- https://bugzilla.suse.com/show_bug.cgi?id=1256941
- https://bugzilla.suse.com/show_bug.cgi?id=1256942
- https://bugzilla.suse.com/show_bug.cgi?id=1256944