CVE-2026-27950

NameCVE-2026-27950
DescriptionFreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.23.0, the fix for the heap-use-after-free described in CVE-2026-24680 is incomplete. While the vulnerable execution flow referenced in the advisory exists in the SDL2 implementation, the fix appears to have been applied only to the SDL3 code path. In the SDL2 implementation, the pointer is not nulled after free. This creates a situation where the advisory suggests the vulnerability is fully resolved, while builds or environments still using SDL2 may retain the vulnerable logic. A complete fix is available in version 3.23.0.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
freerdp2 (PTS)bullseye2.3.0+dfsg1-2+deb11u1fixed
bullseye (security)2.3.0+dfsg1-2+deb11u3fixed
bookworm2.11.7+dfsg1-6~deb12u1fixed
freerdp3 (PTS)trixie3.15.0+dfsg-2.1vulnerable
forky, sid3.24.2+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
freerdp2source(unstable)(not affected)
freerdp3source(unstable)3.23.0+dfsg-1

Notes

[trixie] - freerdp3 <no-dsa> (Minor issue)
[bookworm] - freerdp3 <no-dsa> (Minor issue)
- freerdp2 <not-affected> (SDL2 client introduced in v3.0.0-beta1)
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-rvfg-86cr-5r6p
Fixed by: https://github.com/FreeRDP/FreeRDP/commit/5f62aa11c1bdf00f94c40ea9ebb260a752740b80 (3.23.0)

Search for package or bug name: Reporting problems