freerdp-2.11.7-4.el8_10

エラータID: AXSA:2026-379:08

Release date: 
Wednesday, April 1, 2026 - 22:29
Subject: 
freerdp-2.11.7-4.el8_10
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
High
Description: 

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.

Security Fix(es):

* freerdp: FreeRDP: Arbitrary code execution via heap out-of-bounds write in RLE planar decode path (CVE-2026-26965)
* freerdp: FreeRDP: Arbitrary code execution via heap buffer overflow in GDI surface pipeline (CVE-2026-26955)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2026-26955
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.23.0, a malicious RDP server can trigger a heap buffer overflow in FreeRDP clients using the GDI surface pipeline (e.g., `xfreerdp`) by sending an RDPGFX ClearCodec surface command with an out-of-bounds destination rectangle. The `gdi_SurfaceCommand_ClearCodec()` handler does not call `is_within_surface()` to validate the command rectangle against the destination surface dimensions, allowing attacker-controlled `cmd->left`/`cmd->top` (and subcodec rectangle offsets) to reach image copy routines that write into `surface->data` without bounds enforcement. The OOB write corrupts an adjacent `gdiGfxSurface` struct's `codecs*` pointer with attacker-controlled pixel data, and corruption of `codecs*` is sufficient to reach an indirect function pointer call (`NSC_CONTEXT.decode` at `nsc.c:500`) on a subsequent codec command — full instruction pointer (RIP) control demonstrated in exploitability harness. Users should upgrade to version 3.23.0 to receive a patch.
CVE-2026-26965
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.23.0, in the RLE planar decode path, `planar_decompress_plane_rle()` writes into `pDstData` at `((nYDst+y) * nDstStep) + (4*nXDst) + nChannel` without verifying that `(nYDst+nSrcHeight)` fits in the destination height or that `(nXDst+nSrcWidth)` fits in the destination stride. When `TempFormat != DstFormat`, `pDstData` becomes `planar->pTempData` (sized for the desktop), while `nYDst` is only validated against the **surface** by `is_within_surface()`. A malicious RDP server can exploit this to perform a heap out-of-bounds write with attacker-controlled offset and pixel data on any connecting FreeRDP client. The OOB write reaches up to 132,096 bytes past the temp buffer end, and on the brk heap (desktop ≤ 128×128), an adjacent `NSC_CONTEXT` struct's `decode` function pointer is overwritten with attacker-controlled pixel data — control-flow–relevant corruption (function pointer overwritten) demonstrated under deterministic heap layout (`nsc->decode = 0xFF414141FF414141`). Version 3.23.0 fixes the vulnerability.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. freerdp-2.11.7-4.el8_10.src.rpm
    MD5: e1c6d7905380845897da919fb49acbe7
    SHA-256: 2b1cb6b3f6bba6580efbafe3a2d249818be92c81fe094155ae4ee7162e564c2a
    Size: 7.01 MB

Asianux Server 8 for x86_64
  1. freerdp-2.11.7-4.el8_10.x86_64.rpm
    MD5: 87f2f4d9d1bc09fe616d95971968ccbf
    SHA-256: a7ee2a40b82aa37f52e2003755e49460f400dff2bd13da1fec0178afab816dd3
    Size: 117.69 kB
  2. freerdp-devel-2.11.7-4.el8_10.i686.rpm
    MD5: 74b336867e5a1414e7b9e0a3d12e580e
    SHA-256: 2c98c39ffaf27e429c76fd777e0276cfff7590ceab2bca66311a9233b77f1b5e
    Size: 146.90 kB
  3. freerdp-devel-2.11.7-4.el8_10.x86_64.rpm
    MD5: 6bdab20a43cb1e67505180f1aa4f008d
    SHA-256: 524ca06b157c9468a0dc7bf931daa9039a31d74f9b257263c1b8c5020b999443
    Size: 146.92 kB
  4. freerdp-libs-2.11.7-4.el8_10.i686.rpm
    MD5: 9e1bb064d5be900c32ff107d1c5ab78b
    SHA-256: c2965077a250025d55c64dc0a8eaa626981eb256e704e4ce3553c6687fdcb968
    Size: 876.04 kB
  5. freerdp-libs-2.11.7-4.el8_10.x86_64.rpm
    MD5: 6cd9fa42242ddca00f7a16305e9ae0b8
    SHA-256: a6e37489da1d537d59b4235a7752660a720367dcc9689e199f02d5cf73089e72
    Size: 927.74 kB
  6. libwinpr-2.11.7-4.el8_10.i686.rpm
    MD5: 15270d13491b6e116e7f022d2989b594
    SHA-256: 18d998f6c557baffd42e02aaa60b0b336b95a865461d899444cae61c1569af86
    Size: 361.72 kB
  7. libwinpr-2.11.7-4.el8_10.x86_64.rpm
    MD5: a5e792e3e6e7339f033e3cc1b29c358b
    SHA-256: f5ae8dc0c45c8ad3d50be9e50ea1e9096a2c73805fb2e50b705da1d20641b02b
    Size: 378.47 kB
  8. libwinpr-devel-2.11.7-4.el8_10.i686.rpm
    MD5: fb68a24f7100145c8b786388c0ec95ba
    SHA-256: b927bb190ad5192ab64b0dc7130388764cb9f5bc31794843be9f48e4109cebd0
    Size: 175.04 kB
  9. libwinpr-devel-2.11.7-4.el8_10.x86_64.rpm
    MD5: cfc3d6c503a810342717b880b357a04c
    SHA-256: ed0a1717248f963a01ebd97194e565562cdfed55a1dcc02a26af15fad1fa6dd3
    Size: 175.03 kB