{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "CVE-2026-23948: fix missing NULL check in core/info\n- CVE-2026-24491: reset channel_callback before close in drdynvc\n- CVE-2026-24676: reset audin->format in channels/audin\n- CVE-2026-24680: reset pointer after memory release in Wayland client\n- CVE-2026-24681: cancel all USB transfers on channel close in urbdrc\n- CVE-2026-24684: terminate rdpsnd thread before free",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771857838",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771857838"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/centos7els/advisories/2026/clsa-2026_1771857838.json"
      }
    ],
    "tracking": {
      "current_release_date": "2026-03-05T10:45:42Z",
      "generator": {
        "date": "2026-03-05T10:45:42Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2026:1771857838",
      "initial_release_date": "2026-02-23T14:44:01Z",
      "revision_history": [
        {
          "date": "2026-02-23T14:44:01Z",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2026-03-05T10:45:42Z",
          "number": "2",
          "summary": "Official Publication"
        }
      ],
      "status": "final",
      "version": "2"
    },
    "title": "freerdp: Fix of 6 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Community Enterprise Operating System 7",
                "product": {
                  "name": "Community Enterprise Operating System 7",
                  "product_id": "CentOS-7",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:centos:centos:7:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Community Enterprise Operating System"
          }
        ],
        "category": "vendor",
        "name": "Red Hat, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
                "product": {
                  "name": "libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
                  "product_id": "libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/libwinpr@2.1.1-5.el7_9.tuxcare.els14?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
                "product": {
                  "name": "freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
                  "product_id": "freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/freerdp-libs@2.1.1-5.el7_9.tuxcare.els14?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
                "product": {
                  "name": "libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
                  "product_id": "libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/libwinpr-devel@2.1.1-5.el7_9.tuxcare.els14?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
                "product": {
                  "name": "freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
                  "product_id": "freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/freerdp-devel@2.1.1-5.el7_9.tuxcare.els14?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "freerdp-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
                "product": {
                  "name": "freerdp-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
                  "product_id": "freerdp-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/freerdp@2.1.1-5.el7_9.tuxcare.els14?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.i686",
                "product": {
                  "name": "libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.i686",
                  "product_id": "libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/libwinpr@2.1.1-5.el7_9.tuxcare.els14?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.i686",
                "product": {
                  "name": "freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.i686",
                  "product_id": "freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/freerdp-libs@2.1.1-5.el7_9.tuxcare.els14?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
                "product": {
                  "name": "libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
                  "product_id": "libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/libwinpr-devel@2.1.1-5.el7_9.tuxcare.els14?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
                "product": {
                  "name": "freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
                  "product_id": "freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/freerdp-devel@2.1.1-5.el7_9.tuxcare.els14?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.x86_64"
        },
        "product_reference": "libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.i686 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.i686"
        },
        "product_reference": "libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.i686",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.x86_64"
        },
        "product_reference": "freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.i686 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.i686"
        },
        "product_reference": "freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.i686",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64"
        },
        "product_reference": "libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686"
        },
        "product_reference": "libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64"
        },
        "product_reference": "freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686"
        },
        "product_reference": "freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "freerdp-0:2.1.1-5.el7_9.tuxcare.els14.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:freerdp-0:2.1.1-5.el7_9.tuxcare.els14.x86_64"
        },
        "product_reference": "freerdp-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
        "relates_to_product_reference": "CentOS-7"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2026-24676",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, AUDIN format renegotiation frees the active format list while the capture thread continues using audin->format, leading to a use after free in audio_format_compatible. This vulnerability is fixed in 3.22.0.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:freerdp-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
          "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
          "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
          "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.i686",
          "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
          "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.i686",
          "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
          "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
          "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2026-24676"
        },
        {
          "category": "external",
          "summary": "https://github.com/FreeRDP/FreeRDP/commit/026b81ae5831ac1598d8f7371e0d0996fac7db00",
          "url": "https://github.com/FreeRDP/FreeRDP/commit/026b81ae5831ac1598d8f7371e0d0996fac7db00"
        },
        {
          "category": "external",
          "summary": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-qh5p-frq4-pgxj",
          "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-qh5p-frq4-pgxj"
        }
      ],
      "release_date": "2026-02-09T19:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-23T14:44:01.460006Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771857838",
          "product_ids": [
            "CentOS-7:freerdp-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771857838"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:freerdp-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2026-24684",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, the RDPSND async playback thread can process queued PDUs after the channel is closed and internal state is freed, leading to a use after free in rdpsnd_treat_wave. This vulnerability is fixed in 3.22.0.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:freerdp-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
          "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
          "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
          "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.i686",
          "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
          "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.i686",
          "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
          "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
          "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2026-24684"
        },
        {
          "category": "external",
          "summary": "https://github.com/FreeRDP/FreeRDP/commit/622bb7b4402491ca003f47472d0e478132673696",
          "url": "https://github.com/FreeRDP/FreeRDP/commit/622bb7b4402491ca003f47472d0e478132673696"
        },
        {
          "category": "external",
          "summary": "https://github.com/FreeRDP/FreeRDP/commit/afa6851dc80835d3101e40fcef51b6c5c0f43ea5",
          "url": "https://github.com/FreeRDP/FreeRDP/commit/afa6851dc80835d3101e40fcef51b6c5c0f43ea5"
        },
        {
          "category": "external",
          "summary": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vcgv-xgjp-h83q",
          "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vcgv-xgjp-h83q"
        }
      ],
      "release_date": "2026-02-09T19:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-23T14:44:01.460006Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771857838",
          "product_ids": [
            "CentOS-7:freerdp-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771857838"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:freerdp-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2026-24491",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, video_timer can send client notifications after the control channel is closed, dereferencing a freed callback and triggering a use after free. This vulnerability is fixed in 3.22.0.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:freerdp-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
          "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
          "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
          "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.i686",
          "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
          "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.i686",
          "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
          "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
          "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2026-24491"
        },
        {
          "category": "external",
          "summary": "https://github.com/FreeRDP/FreeRDP/commit/e02e052f6692550e539d10f99de9c35a23492db2",
          "url": "https://github.com/FreeRDP/FreeRDP/commit/e02e052f6692550e539d10f99de9c35a23492db2"
        },
        {
          "category": "external",
          "summary": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4x6j-w49r-869g",
          "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4x6j-w49r-869g"
        }
      ],
      "release_date": "2026-02-09T19:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-23T14:44:01.460006Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771857838",
          "product_ids": [
            "CentOS-7:freerdp-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771857838"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:freerdp-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2026-24680",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, sdl_Pointer_New frees data on failure, then pointer_free calls sdl_Pointer_Free and frees it again, triggering ASan UAF. This vulnerability is fixed in 3.22.0.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:freerdp-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
          "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
          "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
          "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.i686",
          "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
          "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.i686",
          "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
          "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
          "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2026-24680"
        },
        {
          "category": "external",
          "summary": "https://github.com/FreeRDP/FreeRDP/commit/c42ecbd183b001e76bfc3614cddfad0034acc758",
          "url": "https://github.com/FreeRDP/FreeRDP/commit/c42ecbd183b001e76bfc3614cddfad0034acc758"
        },
        {
          "category": "external",
          "summary": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-j893-9wg8-33rc",
          "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-j893-9wg8-33rc"
        }
      ],
      "release_date": "2026-02-09T19:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-23T14:44:01.460006Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771857838",
          "product_ids": [
            "CentOS-7:freerdp-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771857838"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:freerdp-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2026-24681",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, aAsynchronous bulk transfer completions can use a freed channel callback after URBDRC channel close, leading to a use after free in urb_write_completion. This vulnerability is fixed in 3.22.0.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:freerdp-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
          "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
          "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
          "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.i686",
          "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
          "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.i686",
          "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
          "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
          "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2026-24681"
        },
        {
          "category": "external",
          "summary": "https://github.com/FreeRDP/FreeRDP/commit/414f701464929c217f2509bcbd6d2c1f00f7ed73",
          "url": "https://github.com/FreeRDP/FreeRDP/commit/414f701464929c217f2509bcbd6d2c1f00f7ed73"
        },
        {
          "category": "external",
          "summary": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-ccvv-hg2w-6x9j",
          "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-ccvv-hg2w-6x9j"
        }
      ],
      "release_date": "2026-02-09T19:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-23T14:44:01.460006Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771857838",
          "product_ids": [
            "CentOS-7:freerdp-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771857838"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:freerdp-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2026-23948",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "description",
          "text": "FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, a NULL pointer dereference vulnerability in rdp_write_logon_info_v2() allows a malicious RDP server to crash FreeRDP proxy by sending a specially crafted LogonInfoV2 PDU with cbDomain=0 or cbUserName=0. This vulnerability is fixed in 3.22.0.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:freerdp-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
          "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
          "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
          "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.i686",
          "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
          "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.i686",
          "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
          "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
          "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2026-23948"
        },
        {
          "category": "external",
          "summary": "https://github.com/FreeRDP/FreeRDP/commit/4d44e3c097656a8b9ec696353647b0888ca45860",
          "url": "https://github.com/FreeRDP/FreeRDP/commit/4d44e3c097656a8b9ec696353647b0888ca45860"
        },
        {
          "category": "external",
          "summary": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-6f3c-qvqq-2px5",
          "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-6f3c-qvqq-2px5"
        }
      ],
      "release_date": "2026-02-09T19:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-23T14:44:01.460006Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1771857838",
          "product_ids": [
            "CentOS-7:freerdp-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1771857838"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:freerdp-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:freerdp-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:freerdp-libs-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:libwinpr-0:2.1.1-5.el7_9.tuxcare.els14.x86_64",
            "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.i686",
            "CentOS-7:libwinpr-devel-0:2.1.1-5.el7_9.tuxcare.els14.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}