Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-24681

Опубликовано: 09 фев. 2026
Источник: debian
EPSS Низкий

Описание

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, aAsynchronous bulk transfer completions can use a freed channel callback after URBDRC channel close, leading to a use after free in urb_write_completion. This vulnerability is fixed in 3.22.0.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
freerdp3fixed3.22.0+dfsg-1package
freerdp3no-dsatrixiepackage
freerdp2removedpackage
freerdp2no-dsabookwormpackage

Примечания

  • https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-ccvv-hg2w-6x9j

  • Fixed by: https://github.com/FreeRDP/FreeRDP/commit/414f701464929c217f2509bcbd6d2c1f00f7ed73 (3.22.0)

EPSS

Процентиль: 5%
0.00019
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 2 месяцев назад

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, aAsynchronous bulk transfer completions can use a freed channel callback after URBDRC channel close, leading to a use after free in urb_write_completion. This vulnerability is fixed in 3.22.0.

CVSS3: 5.3
redhat
около 2 месяцев назад

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, aAsynchronous bulk transfer completions can use a freed channel callback after URBDRC channel close, leading to a use after free in urb_write_completion. This vulnerability is fixed in 3.22.0.

CVSS3: 7.5
nvd
около 2 месяцев назад

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, aAsynchronous bulk transfer completions can use a freed channel callback after URBDRC channel close, leading to a use after free in urb_write_completion. This vulnerability is fixed in 3.22.0.

suse-cvrf
около 1 месяца назад

Security update for freerdp

suse-cvrf
около 1 месяца назад

Security update for freerdp

EPSS

Процентиль: 5%
0.00019
Низкий