Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-22851

Опубликовано: 14 янв. 2026
Источник: debian
EPSS Низкий

Описание

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a race condition between the RDPGFX dynamic virtual channel thread and the SDL render thread leads to a heap use-after-free. Specifically, an escaped pointer to sdl->primary (SDL_Surface) is accessed after it has been freed during RDPGFX ResetGraphics handling. This vulnerability is fixed in 3.20.1.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
freerdp3fixed3.20.2+dfsg-1package
freerdp3no-dsatrixiepackage
freerdp2removedpackage
freerdp2no-dsabookwormpackage

Примечания

  • https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8g87-6pvc-wh99

EPSS

Процентиль: 14%
0.00047
Низкий

Связанные уязвимости

CVSS3: 5.9
ubuntu
24 дня назад

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a race condition between the RDPGFX dynamic virtual channel thread and the SDL render thread leads to a heap use-after-free. Specifically, an escaped pointer to sdl->primary (SDL_Surface) is accessed after it has been freed during RDPGFX ResetGraphics handling. This vulnerability is fixed in 3.20.1.

CVSS3: 5.9
nvd
24 дня назад

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a race condition between the RDPGFX dynamic virtual channel thread and the SDL render thread leads to a heap use-after-free. Specifically, an escaped pointer to sdl->primary (SDL_Surface) is accessed after it has been freed during RDPGFX ResetGraphics handling. This vulnerability is fixed in 3.20.1.

CVSS3: 5.9
fstec
25 дней назад

Уязвимость клиента SDL3 RDP-клиента FreeRDP, позволяющая нарушителю оказать воздействие на доступность защищаемой информации

suse-cvrf
9 дней назад

Security update for freerdp

EPSS

Процентиль: 14%
0.00047
Низкий