Количество 7
Количество 7
BDU:2026-00623
Уязвимость клиента SDL3 RDP-клиента FreeRDP, позволяющая нарушителю оказать воздействие на доступность защищаемой информации
CVE-2026-22851
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a race condition between the RDPGFX dynamic virtual channel thread and the SDL render thread leads to a heap use-after-free. Specifically, an escaped pointer to sdl->primary (SDL_Surface) is accessed after it has been freed during RDPGFX ResetGraphics handling. This vulnerability is fixed in 3.20.1.
CVE-2026-22851
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a race condition between the RDPGFX dynamic virtual channel thread and the SDL render thread leads to a heap use-after-free. Specifically, an escaped pointer to sdl->primary (SDL_Surface) is accessed after it has been freed during RDPGFX ResetGraphics handling. This vulnerability is fixed in 3.20.1.
CVE-2026-22851
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a race condition between the RDPGFX dynamic virtual channel thread and the SDL render thread leads to a heap use-after-free. Specifically, an escaped pointer to sdl->primary (SDL_Surface) is accessed after it has been freed during RDPGFX ResetGraphics handling. This vulnerability is fixed in 3.20.1.
CVE-2026-22851
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...
SUSE-SU-2026:0345-1
Security update for freerdp
openSUSE-SU-2026:20339-1
Security update for freerdp
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2026-00623 Уязвимость клиента SDL3 RDP-клиента FreeRDP, позволяющая нарушителю оказать воздействие на доступность защищаемой информации | CVSS3: 5.9 | 0% Низкий | 3 месяца назад | |
CVE-2026-22851 FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a race condition between the RDPGFX dynamic virtual channel thread and the SDL render thread leads to a heap use-after-free. Specifically, an escaped pointer to sdl->primary (SDL_Surface) is accessed after it has been freed during RDPGFX ResetGraphics handling. This vulnerability is fixed in 3.20.1. | CVSS3: 5.9 | 0% Низкий | 2 месяца назад | |
CVE-2026-22851 FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a race condition between the RDPGFX dynamic virtual channel thread and the SDL render thread leads to a heap use-after-free. Specifically, an escaped pointer to sdl->primary (SDL_Surface) is accessed after it has been freed during RDPGFX ResetGraphics handling. This vulnerability is fixed in 3.20.1. | CVSS3: 5 | 0% Низкий | 2 месяца назад | |
CVE-2026-22851 FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a race condition between the RDPGFX dynamic virtual channel thread and the SDL render thread leads to a heap use-after-free. Specifically, an escaped pointer to sdl->primary (SDL_Surface) is accessed after it has been freed during RDPGFX ResetGraphics handling. This vulnerability is fixed in 3.20.1. | CVSS3: 5.9 | 0% Низкий | 2 месяца назад | |
CVE-2026-22851 FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ... | CVSS3: 5.9 | 0% Низкий | 2 месяца назад | |
SUSE-SU-2026:0345-1 Security update for freerdp | около 2 месяцев назад | |||
openSUSE-SU-2026:20339-1 Security update for freerdp | 20 дней назад |
Уязвимостей на страницу