freerdp-2.11.7-1.el9_7.3

エラータID: AXSA:2026-391:09

Release date: 
Thursday, April 2, 2026 - 19:13
Subject: 
freerdp-2.11.7-1.el9_7.3
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
High
Description: 

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.

Security Fix(es):

* freerdp: FreeRDP: Arbitrary code execution via heap out-of-bounds write in RLE planar decode path (CVE-2026-26965)
* freerdp: FreeRDP: Arbitrary code execution via heap buffer overflow in GDI surface pipeline (CVE-2026-26955)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2026-26955
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.23.0, a malicious RDP server can trigger a heap buffer overflow in FreeRDP clients using the GDI surface pipeline (e.g., `xfreerdp`) by sending an RDPGFX ClearCodec surface command with an out-of-bounds destination rectangle. The `gdi_SurfaceCommand_ClearCodec()` handler does not call `is_within_surface()` to validate the command rectangle against the destination surface dimensions, allowing attacker-controlled `cmd->left`/`cmd->top` (and subcodec rectangle offsets) to reach image copy routines that write into `surface->data` without bounds enforcement. The OOB write corrupts an adjacent `gdiGfxSurface` struct's `codecs*` pointer with attacker-controlled pixel data, and corruption of `codecs*` is sufficient to reach an indirect function pointer call (`NSC_CONTEXT.decode` at `nsc.c:500`) on a subsequent codec command — full instruction pointer (RIP) control demonstrated in exploitability harness. Users should upgrade to version 3.23.0 to receive a patch.
CVE-2026-26965
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.23.0, in the RLE planar decode path, `planar_decompress_plane_rle()` writes into `pDstData` at `((nYDst+y) * nDstStep) + (4*nXDst) + nChannel` without verifying that `(nYDst+nSrcHeight)` fits in the destination height or that `(nXDst+nSrcWidth)` fits in the destination stride. When `TempFormat != DstFormat`, `pDstData` becomes `planar->pTempData` (sized for the desktop), while `nYDst` is only validated against the **surface** by `is_within_surface()`. A malicious RDP server can exploit this to perform a heap out-of-bounds write with attacker-controlled offset and pixel data on any connecting FreeRDP client. The OOB write reaches up to 132,096 bytes past the temp buffer end, and on the brk heap (desktop ≤ 128×128), an adjacent `NSC_CONTEXT` struct's `decode` function pointer is overwritten with attacker-controlled pixel data — control-flow–relevant corruption (function pointer overwritten) demonstrated under deterministic heap layout (`nsc->decode = 0xFF414141FF414141`). Version 3.23.0 fixes the vulnerability.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. freerdp-2.11.7-1.el9_7.3.src.rpm
    MD5: 463a215d0268bcf7062462b65cd27977
    SHA-256: 0cb9b6aaae4773ed6df9fc1bd77ae2293c837af1f7fd8278cb72155461c11ff0
    Size: 7.01 MB

Asianux Server 9 for x86_64
  1. freerdp-2.11.7-1.el9_7.3.x86_64.rpm
    MD5: bdd76c66300c9a5618afd340c4085224
    SHA-256: 620e5b4edecfd988ce22cfbfcd702fbcec383727793a5cf3d2f5e2206ccf7a8b
    Size: 110.85 kB
  2. freerdp-devel-2.11.7-1.el9_7.3.i686.rpm
    MD5: 5ba5b1c45c82a54f59306d712d9bc0ed
    SHA-256: ffaf7fb3461c44b9dc9dabd3df606f5c79e3c70dc83787e679a86ec05a79650c
    Size: 175.43 kB
  3. freerdp-devel-2.11.7-1.el9_7.3.x86_64.rpm
    MD5: da6cda66093f4f9331d2dcd43f1f30e4
    SHA-256: a2cfb6fdb4742c3cde106f8fa7be78fff90a6b40c5bbdf1899f67a95a041100b
    Size: 175.49 kB
  4. freerdp-libs-2.11.7-1.el9_7.3.i686.rpm
    MD5: a30d8605973582791a5da0a2a370b6de
    SHA-256: 69fc95d0470286c22fef32dd0009a32cc0fb252ca85d6551dd8dc2e93dceb5df
    Size: 849.20 kB
  5. freerdp-libs-2.11.7-1.el9_7.3.x86_64.rpm
    MD5: 001803da3743eef48555bb556df39ab7
    SHA-256: fe71b70c670daeda71f0020aafb9b3b487390196d7f11deff0a9945e469f5e58
    Size: 904.60 kB
  6. libwinpr-2.11.7-1.el9_7.3.i686.rpm
    MD5: c40200667642c92de65dc4bc91e7f1d5
    SHA-256: cce76848a96df34222154fbdbcba2ab5cad00f14e5b5418b79e947aa70277c5a
    Size: 340.42 kB
  7. libwinpr-2.11.7-1.el9_7.3.x86_64.rpm
    MD5: 13199683ec834d09ca5914b2adb7f479
    SHA-256: 0f047d8094746dcc787e696c1a8b6fd03baa2126e73025579a53de0099543312
    Size: 354.79 kB
  8. libwinpr-devel-2.11.7-1.el9_7.3.i686.rpm
    MD5: 37afe6bbd13e85d3563f4e151563ecc0
    SHA-256: 85298d2ca2c90084a428def0dc74115cd8e1fe6c2f41b7a6f69bff5e9c409c0a
    Size: 181.31 kB
  9. libwinpr-devel-2.11.7-1.el9_7.3.x86_64.rpm
    MD5: 14913cbda95dfa858d37c1eb13ce1266
    SHA-256: 589c921a39c5173ae67c4a320c896b1fb2f3a94e36549ed1f644338e9a1646d8
    Size: 181.28 kB