SB2026041654 - Red Hat Enterprise Linux 9 update for freerdp



SB2026041654 - Red Hat Enterprise Linux 9 update for freerdp

Published: April 16, 2026

Security Bulletin ID SB2026041654
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Heap-based buffer overflow (CVE-ID: CVE-2026-33984)

The vulnerability allows a remote attacker to execute arbitrary code.

The vulnerability exists due to a heap-based buffer overflow in resize_vbar_entry() in libfreerdp/codec/clear.c when processing ClearCodec band data from a malicious RDP server. A remote attacker can send crafted ClearCodec band data to execute arbitrary code.

User interaction is required to connect to a malicious RDP server, and exploitation depends on realloc failure under memory pressure.


2) Integer overflow (CVE-ID: CVE-2026-33983)

The vulnerability allows a remote attacker to cause a denial of service.

The vulnerability exists due to integer overflow or wraparound in progressive_decompress_tile_upgrade() when processing progressive codec tile data with changed quant values between passes. A remote attacker can send specially crafted progressive codec data to cause a denial of service.

User interaction is required for exploitation.


Remediation

Install update from vendor's website.