{"schema_version": "1.7.0", "id": "RLSA-2026:2048", "modified": "2026-02-07T09:08:46.790153Z", "published": "2026-02-07T09:06:42.672591Z", "upstream": ["CVE-2026-23530", "CVE-2026-23531", "CVE-2026-23532", "CVE-2026-23533", "CVE-2026-23534", "CVE-2026-23883", "CVE-2026-23884"], "summary": "Important: freerdp security update", "details": "FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.\n\nSecurity Fix(es):\n\n* freerdp: FreeRDP: Heap buffer overflow leading to denial of service and potential code execution from a malicious server. (CVE-2026-23530)\n\n* freerdp: FreeRDP: Denial of Service and potential code execution via use-after-free vulnerability (CVE-2026-23884)\n\n* freerdp: FreeRDP: Arbitrary code execution and denial of service via malicious server (CVE-2026-23883)\n\n* freerdp: FreeRDP: Heap buffer overflow leads to denial of service and potential code execution (CVE-2026-23533)\n\n* freerdp: FreeRDP: Heap buffer overflow via crafted RDPGFX surface updates leads to denial of service and potential code execution. (CVE-2026-23531)\n\n* freerdp: FreeRDP: Arbitrary code execution and denial of service via client-side heap buffer overflow (CVE-2026-23534)\n\n* freerdp: FreeRDP: Denial of Service and potential code execution via client-side heap buffer overflow (CVE-2026-23532)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "severity": [{"type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H"}], "affected": [{"package": {"ecosystem": "Rocky Linux:9", "name": "freerdp", "purl": "pkg:rpm/rocky-linux/freerdp?distro=rocky-linux-9&epoch=2"}, "ranges": [{"type": "ECOSYSTEM", "events": [{"introduced": "0"}, {"fixed": "2:2.11.7-1.el9_7.1"}], "database_specific": {"yum_repository": "AppStream"}}]}], "references": [{"type": "ADVISORY", "url": "https://errata.rockylinux.org/RLSA-2026:2048"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430877"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430880"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430885"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430886"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430887"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430888"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430891"}], "credits": [{"name": "Rocky Enterprise Software Foundation"}, {"name": "Red Hat"}]}