Release date:
2026-04-03 13:35:48 UTC
Description:
- CVE-2023-39355: fix use-after-free in RDPGFX_CMDID_RESETGRAPHICS handling when
context->maxPlaneSize == 0; update context->planesBuffer after free and
prevent access to freed memory
- CVE-2026-26965: fix heap out-of-bounds write in RLE planar decode that permit
attacker-controlled pixel data and offset overwrite adjacent function pointer;
validate (nYDst+nSrcHeight) and (nXDst+nSrcWidth) against destination bounds
and ensure writes use correct buffer, prevent OOB write
- CVE-2026-26955: fix heap buffer overflow in GDI surface pipeline caused by
out-of-bounds ClearCodec destination rectangle; add top-level guard in
clear_decompress() to validate nXDst/nYDst against destination surface
dimensions protecting all code paths (bands, residual, glyph, subcodec);
fix subcodec bounds checks to compare against destination dimensions
Updated packages:
-
freerdp-2.1.1-5.el7_9.tuxcare.els19.x86_64.rpm
sha:7f138eb936e1327cd949f3807a46eafd334b00f53d44fad9a4fdcffb13c85987
-
freerdp-devel-2.1.1-5.el7_9.tuxcare.els19.i686.rpm
sha:ad3c20c044b0cf6cc40894dffd38c676700aff653bab4669fab384a9ec39f460
-
freerdp-devel-2.1.1-5.el7_9.tuxcare.els19.x86_64.rpm
sha:6d290eb0ad5c3191f38fe2bbcb89c1e30d14d87182e42928ee3fbf647f7db208
-
freerdp-libs-2.1.1-5.el7_9.tuxcare.els19.i686.rpm
sha:a8a75fe200f33574491b4092932990850b6f8e2972845657f3d11fc46908a3f2
-
freerdp-libs-2.1.1-5.el7_9.tuxcare.els19.x86_64.rpm
sha:5629459dbabed1832d497b0ede4e721e54c2dd994640e50649074bddf0653465
-
libwinpr-2.1.1-5.el7_9.tuxcare.els19.i686.rpm
sha:ee27c57807c3a6a3d4818441397215d3894c64b43b850076d65f9887f1bd99fb
-
libwinpr-2.1.1-5.el7_9.tuxcare.els19.x86_64.rpm
sha:dffb3c8153d4bb33032cde3bceac28491d2c214194ec57038cbc45bb4a0a2d46
-
libwinpr-devel-2.1.1-5.el7_9.tuxcare.els19.i686.rpm
sha:fd5d36fa01f046a51772d377257677b6ad266bac74d24dd49fcdf21b61541fa3
-
libwinpr-devel-2.1.1-5.el7_9.tuxcare.els19.x86_64.rpm
sha:f3316af59ced867dfea5e8ffb1a5b76392b84bd53f0f1a4c7a8392f4c8b3b1c2
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.