-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2026-23d669bf94 2026-01-23 00:54:29.972543+00:00 --------------------------------------------------------------------------------
Name : freerdp Product : Fedora 43 Version : 3.21.0 Release : 1.fc43 URL : http://www.freerdp.com/ Summary : Free implementation of the Remote Desktop Protocol (RDP) Description : The xfreerdp & wlfreerdp Remote Desktop Protocol (RDP) clients from the FreeRDP project. xfreerdp & wlfreerdp can connect to RDP servers such as Microsoft Windows machines, xrdp and VirtualBox. -------------------------------------------------------------------------------- Update Information: Update to 3.21.0 -------------------------------------------------------------------------------- ChangeLog: * Tue Jan 20 2026 Ondrej Holy <[email protected]> - 2:3.21.0-1 - Update to 3.21.0 (CVE-2026-23530, CVE-2026-23531, CVE-2026-23532, CVE-2026-23533, CVE-2026-23534, CVE-2026-23732, CVE-2026-23883, CVE-2026-23884) Resolves: rhbz#2430928 * Fri Jan 16 2026 Fedora Release Engineering <[email protected]> - 2:3.20.2-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_44_Mass_Rebuild -------------------------------------------------------------------------------- References: [ 1 ] Bug #2430897 - CVE-2026-23532 freerdp: FreeRDP: Denial of Service and potential code execution via client-side heap buffer overflow [fedora-43] https://bugzilla.redhat.com/show_bug.cgi?id=2430897 [ 2 ] Bug #2430902 - CVE-2026-23534 freerdp: FreeRDP: Arbitrary code execution and denial of service via client-side heap buffer overflow [fedora-43] https://bugzilla.redhat.com/show_bug.cgi?id=2430902 [ 3 ] Bug #2430907 - CVE-2026-23531 freerdp: FreeRDP: Heap buffer overflow via crafted RDPGFX surface updates leads to denial of service and potential code execution. [fedora-43] https://bugzilla.redhat.com/show_bug.cgi?id=2430907 [ 4 ] Bug #2430913 - CVE-2026-23533 freerdp: FreeRDP: Heap buffer overflow leads to denial of service and potential code execution [fedora-43] https://bugzilla.redhat.com/show_bug.cgi?id=2430913 [ 5 ] Bug #2430918 - CVE-2026-23530 freerdp: FreeRDP: Heap buffer overflow leading to denial of service and potential code execution from a malicious server. [fedora-43] https://bugzilla.redhat.com/show_bug.cgi?id=2430918 [ 6 ] Bug #2430923 - CVE-2026-23883 freerdp: FreeRDP: Arbitrary code execution and denial of service via malicious server [fedora-43] https://bugzilla.redhat.com/show_bug.cgi?id=2430923 [ 7 ] Bug #2430932 - CVE-2026-23884 freerdp: FreeRDP: Denial of Service and potential code execution via use-after-free vulnerability [fedora-43] https://bugzilla.redhat.com/show_bug.cgi?id=2430932 -------------------------------------------------------------------------------- This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2026-23d669bf94' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- -- _______________________________________________ package-announce mailing list -- [email protected] To unsubscribe send an email to [email protected] Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/[email protected] Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
