{"affected":[{"ecosystem_specific":{"binaries":[{"freerdp-devel":"2.1.2-12.57.1","winpr2-devel":"2.1.2-12.57.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"freerdp","purl":"pkg:rpm/suse/freerdp&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.1.2-12.57.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"freerdp-devel":"2.1.2-12.57.1","winpr2-devel":"2.1.2-12.57.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"freerdp","purl":"pkg:rpm/suse/freerdp&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.1.2-12.57.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for freerdp fixes the following issues:\n\n- CVE-2026-22855: heap-buffer-overflow in smartcard_unpack_set_attrib_call (bsc#1256721).\n- CVE-2026-22857: heap-use-after-free in irp_thread_func (bsc#1256723).\n- CVE-2026-23533: improper validation can lead to heap buffer overflow in `clear_decompress_residual_data`\n  (bsc#1256943).\n- CVE-2026-23732: improper validation can lead to heap buffer overflow in `Glyph_Alloc` (bsc#1256945).\n- CVE-2026-23884: use-after-free in `gdi_set_bounds` (bsc#1256947).\n- CVE-2026-24491: heap-use-after-free in video_timer (bsc#1257981).\n- CVE-2026-24675: heap-use-after-free in urb_select_interface (bsc#1257982).\n- CVE-2026-24676: heap-use-after-free in audio_format_compatible (bsc#1257983).\n- CVE-2026-24679: heap-buffer-overflow in urb_select_interface (bsc#1257986).\n- CVE-2026-24682: heap-buffer-overflow in audio_formats_free (bsc#1257989).\n- CVE-2026-24684: heap-use-after-free in play_thread (bsc#1257991).\n","id":"SUSE-SU-2026:0762-1","modified":"2026-03-03T12:41:19Z","published":"2026-03-03T12:41:19Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-20260762-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256721"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256723"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256943"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256945"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256947"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257981"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257982"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257983"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257986"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257989"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257991"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-22855"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-22857"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23533"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23732"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23884"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-24491"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-24675"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-24676"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-24679"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-24682"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-24684"}],"related":["CVE-2026-22855","CVE-2026-22857","CVE-2026-23533","CVE-2026-23732","CVE-2026-23884","CVE-2026-24491","CVE-2026-24675","CVE-2026-24676","CVE-2026-24679","CVE-2026-24682","CVE-2026-24684"],"summary":"Security update for freerdp","upstream":["CVE-2026-22855","CVE-2026-22857","CVE-2026-23533","CVE-2026-23732","CVE-2026-23884","CVE-2026-24491","CVE-2026-24675","CVE-2026-24676","CVE-2026-24679","CVE-2026-24682","CVE-2026-24684"]}