{"affected":[{"ecosystem_specific":{"binaries":[{"winpr2-devel":"2.11.7-150700.3.8.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Package Hub 15 SP7","name":"freerdp2","purl":"pkg:rpm/suse/freerdp2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Package%20Hub%2015%20SP7"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.11.7-150700.3.8.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"freerdp2":"2.11.7-150700.3.8.1","freerdp2-devel":"2.11.7-150700.3.8.1","freerdp2-proxy":"2.11.7-150700.3.8.1","freerdp2-server":"2.11.7-150700.3.8.1","libfreerdp2-2":"2.11.7-150700.3.8.1","libwinpr2-2":"2.11.7-150700.3.8.1","winpr2-devel":"2.11.7-150700.3.8.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Workstation Extension 15 SP7","name":"freerdp2","purl":"pkg:rpm/suse/freerdp2&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP7"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.11.7-150700.3.8.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for freerdp2 fixes the following issues:\n\n- CVE-2026-22855: heap-buffer-overflow in smartcard_unpack_set_attrib_call (bsc#1256721).\n- CVE-2026-22857: heap-use-after-free in irp_thread_func (bsc#1256723).\n- CVE-2026-23533: improper validation can lead to heap buffer overflow in `clear_decompress_residual_data`\n  (bsc#1256943).\n- CVE-2026-23732: improper validation can lead to heap buffer overflow in `Glyph_Alloc` (bsc#1256945).\n- CVE-2026-23883: use-after-free when `update_pointer_color` and `freerdp_image_copy_from_pointer_data` fail\n  (bsc#1256946).\n- CVE-2026-23884: use-after-free in `gdi_set_bounds` (bsc#1256947).\n- CVE-2026-24491: heap-use-after-free in video_timer (bsc#1257981).\n- CVE-2026-24675: heap-use-after-free in urb_select_interface (bsc#1257982).\n- CVE-2026-24676: heap-use-after-free in audio_format_compatible (bsc#1257983).\n- CVE-2026-24679: heap-buffer-overflow in urb_select_interface (bsc#1257986).\n- CVE-2026-24681: heap-use-after-free in urb_bulk_transfer_cb (bsc#1257988).\n- CVE-2026-24682: heap-buffer-overflow in audio_formats_free (bsc#1257989).\n- CVE-2026-24683: heap-use-after-free in ainput_send_input_event (bsc#1257990).\n- CVE-2026-24684: heap-use-after-free in play_thread (bsc#1257991).\n","id":"SUSE-SU-2026:0683-1","modified":"2026-02-27T10:42:32Z","published":"2026-02-27T10:42:32Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-20260683-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256721"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256723"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256943"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256945"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256946"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256947"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257981"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257982"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257983"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257986"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257988"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257989"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257990"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257991"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-22855"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-22857"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23533"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23732"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23883"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23884"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-24491"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-24675"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-24676"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-24679"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-24681"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-24682"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-24683"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-24684"}],"related":["CVE-2026-22855","CVE-2026-22857","CVE-2026-23533","CVE-2026-23732","CVE-2026-23883","CVE-2026-23884","CVE-2026-24491","CVE-2026-24675","CVE-2026-24676","CVE-2026-24679","CVE-2026-24681","CVE-2026-24682","CVE-2026-24683","CVE-2026-24684"],"summary":"Security update for freerdp2","upstream":["CVE-2026-22855","CVE-2026-22857","CVE-2026-23533","CVE-2026-23732","CVE-2026-23883","CVE-2026-23884","CVE-2026-24491","CVE-2026-24675","CVE-2026-24676","CVE-2026-24679","CVE-2026-24681","CVE-2026-24682","CVE-2026-24683","CVE-2026-24684"]}