{"affected":[{"ecosystem_specific":{"binaries":[{"freerdp":"3.10.3-150700.3.6.1","freerdp-devel":"3.10.3-150700.3.6.1","freerdp-proxy":"3.10.3-150700.3.6.1","freerdp-server":"3.10.3-150700.3.6.1","freerdp-wayland":"3.10.3-150700.3.6.1","libuwac0-0":"3.10.3-150700.3.6.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Package Hub 15 SP7","name":"freerdp","purl":"pkg:rpm/suse/freerdp&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Package%20Hub%2015%20SP7"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.10.3-150700.3.6.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"freerdp":"3.10.3-150700.3.6.1","freerdp-devel":"3.10.3-150700.3.6.1","freerdp-proxy":"3.10.3-150700.3.6.1","freerdp-proxy-plugins":"3.10.3-150700.3.6.1","freerdp-sdl":"3.10.3-150700.3.6.1","freerdp-server":"3.10.3-150700.3.6.1","libfreerdp-server-proxy3-3":"3.10.3-150700.3.6.1","libfreerdp3-3":"3.10.3-150700.3.6.1","librdtk0-0":"3.10.3-150700.3.6.1","libwinpr3-3":"3.10.3-150700.3.6.1","winpr-devel":"3.10.3-150700.3.6.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Workstation Extension 15 SP7","name":"freerdp","purl":"pkg:rpm/suse/freerdp&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP7"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.10.3-150700.3.6.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for freerdp fixes the following issues:\n\n- CVE-2026-24491: heap-use-after-free in video_timer (bsc#1257981).\n- CVE-2026-24675: heap-use-after-free in urb_select_interface (bsc#1257982).\n- CVE-2026-24676: heap-use-after-free in audio_format_compatible (bsc#1257983).\n- CVE-2026-24677: heap-buffer-overflow in ecam_encoder_compress_h264 (bsc#1257984).\n- CVE-2026-24678: heap-use-after-free in cam_v4l_stream_capture_thread (bsc#1257985).\n- CVE-2026-24679: heap-buffer-overflow in urb_select_interface (bsc#1257986).\n- CVE-2026-24680: heap-use-after-free in update_pointer_new(SDL) (bsc#1257987).\n- CVE-2026-24681: heap-use-after-free in urb_bulk_transfer_cb (bsc#1257988).\n- CVE-2026-24682: heap-buffer-overflow in audio_formats_free (bsc#1257989).\n- CVE-2026-24683: heap-use-after-free in ainput_send_input_event (bsc#1257990).\n- CVE-2026-24684: heap-use-after-free in play_thread (bsc#1257991).\n","id":"SUSE-SU-2026:0763-1","modified":"2026-03-03T12:49:14Z","published":"2026-03-03T12:49:14Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-20260763-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257981"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257982"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257983"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257984"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257985"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257986"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257987"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257988"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257989"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257990"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257991"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-24491"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-24675"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-24676"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-24677"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-24678"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-24679"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-24680"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-24681"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-24682"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-24683"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-24684"}],"related":["CVE-2026-24491","CVE-2026-24675","CVE-2026-24676","CVE-2026-24677","CVE-2026-24678","CVE-2026-24679","CVE-2026-24680","CVE-2026-24681","CVE-2026-24682","CVE-2026-24683","CVE-2026-24684"],"summary":"Security update for freerdp","upstream":["CVE-2026-24491","CVE-2026-24675","CVE-2026-24676","CVE-2026-24677","CVE-2026-24678","CVE-2026-24679","CVE-2026-24680","CVE-2026-24681","CVE-2026-24682","CVE-2026-24683","CVE-2026-24684"]}