RLSA-2026:6005

Source
https://errata.rockylinux.org/RLSA-2026:6005
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2026:6005.json
JSON Data
https://api.test.osv.dev/v1/vulns/RLSA-2026:6005
Upstream
Published
2026-04-07T00:01:14.755526Z
Modified
2026-04-07T00:30:06.566412Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Important: freerdp security update
Details

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.

Security Fix(es):

  • freerdp: FreeRDP: Arbitrary code execution via heap out-of-bounds write in RLE planar decode path (CVE-2026-26965)

  • freerdp: FreeRDP: Arbitrary code execution via heap buffer overflow in GDI surface pipeline (CVE-2026-26955)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:8 / freerdp

Package

Name
freerdp
Purl
pkg:rpm/rocky-linux/freerdp?distro=rocky-linux-8&epoch=2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:2.11.7-4.el8_10
Database specific
{
    "yum_repository": "AppStream"
}

Database specific

source
"https://storage.googleapis.com/resf-osv-data/RLSA-2026:6005.json"