Back

Critical Vulnerabilities in FreeRDP Addressed by SUSE Security Update

Severity: High (Score: 72.0)

Sources: Linuxsecurity

Summary

SUSE has released a security update for FreeRDP, addressing six critical vulnerabilities. The issues include buffer overreads and out-of-bounds writes, which could lead to heap buffer overflows and arbitrary code execution. Specifically, CVE-2026-31806 and CVE-2026-31883 are particularly concerning due to their potential for remote exploitation. The vulnerabilities affect multiple architectures, including aarch64, ppc64le, s390x, x86_64, and i586. The update provides patch instructions for users to mitigate these risks. Users are advised to apply the patches using recommended installation methods like YaST or zypper. The vulnerabilities were disclosed in late February and early March 2026, with the update published on March 31, 2026. Immediate action is recommended to secure affected systems. Key Points: • SUSE's FreeRDP update addresses six critical vulnerabilities. • CVE-2026-31806 and CVE-2026-31883 could allow remote code execution. • Users should apply patches immediately using YaST or zypper.

Key Entities

  • CVE-2026-26271 (cve)
  • CVE-2026-26955 (cve)
  • CVE-2026-26965 (cve)
  • CVE-2026-31806 (cve)
  • CVE-2026-31883 (cve)
  • OpenSUSE (company)
  • SuSE (company)
Loading threat details...

Threat Not Found

The threat cluster you're looking for doesn't exist or has been removed.

Return to Feed