{"id":"MGASA-2026-0086","summary":"Updated freerdp packages fix security vulnerabilities","details":"FreeRDP has a heap-buffer-overflow in audin_process_formats.\n(CVE-2026-22852)\nFreeRDP has a heap-buffer-overflow in drive_process_irp_read.\n(CVE-2026-22854)\nFreeRDP has a heap-buffer-overflow in smartcard_unpack_set_attrib_call.\n(CVE-2026-22855)\nFreeRDP has a heap-use-after-free in create_irp_thread. (CVE-2026-22856)\nFreeRDP has a heap-use-after-free in irp_thread_func. (CVE-2026-22857)\nFreeRDP has a heap-buffer-overflow in urb_select_configuration.\n(CVE-2026-22859)\nFreeRDP has heap-buffer-overflow in Glyph_Alloc. (CVE-2026-23732)\nHeap-use-after-free in update_pointer_new. (CVE-2026-23883)\nHeap-use-after-free in gdi_set_bounds. (CVE-2026-23884)\nFreeRDP has a heap-use-after-free in video_timer. (CVE-2026-24491)\nBuffer Overread in FreeRDP Icon Processing. (CVE-2026-26271)\nFreeRDP has Out-of-bounds Write. (CVE-2026-26955, CVE-2026-26965)\nFreeRDP has a Heap Buffer Overflow in nsc_process_message() via\nUnchecked SURFACE_BITS_COMMAND Bitmap Dimensions. (CVE-2026-31806)\nFreeRDP has a `size_t` underflow in ADPCM decoder leads to\nheap-buffer-overflow write. (CVE-2026-31883)\nFreeRDP has an out-of-bounds read in ADPCM decoders due to missing\npredictor/step_index bounds checks. (CVE-2026-31885)\n","modified":"2026-04-06T17:45:06.256780Z","published":"2026-04-06T17:35:50Z","related":["CVE-2026-22852","CVE-2026-22854","CVE-2026-22855","CVE-2026-22856","CVE-2026-22857","CVE-2026-22859","CVE-2026-23732","CVE-2026-23883","CVE-2026-23884","CVE-2026-24491","CVE-2026-26271","CVE-2026-26955","CVE-2026-26965","CVE-2026-31806","CVE-2026-31883","CVE-2026-31885"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2026-0086.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=35141"},{"type":"REPORT","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/F2VLQU7USVAQ733RYB7II6KGZB3FG2KW/"},{"type":"REPORT","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HAYMD62GFPCFHGN6JPLMCVJHP3SKINMW/"},{"type":"REPORT","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3QGQZQS6664TXPPYGBP7673W2JAXG4K/"},{"type":"REPORT","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/34ABPSLQFVRGFKDSR5ZEDKG5UH6KIBCA/"}],"affected":[{"package":{"name":"freerdp","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/freerdp?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.11.7-1.3.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2026-0086.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}