SUSE-SU-2026:0683-1

Vulnerability from csaf_suse - Published: 2026-02-27 10:42 - Updated: 2026-02-27 10:42
Summary
Security update for freerdp2
Severity
Important
Notes
Title of the patch: Security update for freerdp2
Description of the patch: This update for freerdp2 fixes the following issues: - CVE-2026-22855: heap-buffer-overflow in smartcard_unpack_set_attrib_call (bsc#1256721). - CVE-2026-22857: heap-use-after-free in irp_thread_func (bsc#1256723). - CVE-2026-23533: improper validation can lead to heap buffer overflow in `clear_decompress_residual_data` (bsc#1256943). - CVE-2026-23732: improper validation can lead to heap buffer overflow in `Glyph_Alloc` (bsc#1256945). - CVE-2026-23883: use-after-free when `update_pointer_color` and `freerdp_image_copy_from_pointer_data` fail (bsc#1256946). - CVE-2026-23884: use-after-free in `gdi_set_bounds` (bsc#1256947). - CVE-2026-24491: heap-use-after-free in video_timer (bsc#1257981). - CVE-2026-24675: heap-use-after-free in urb_select_interface (bsc#1257982). - CVE-2026-24676: heap-use-after-free in audio_format_compatible (bsc#1257983). - CVE-2026-24679: heap-buffer-overflow in urb_select_interface (bsc#1257986). - CVE-2026-24681: heap-use-after-free in urb_bulk_transfer_cb (bsc#1257988). - CVE-2026-24682: heap-buffer-overflow in audio_formats_free (bsc#1257989). - CVE-2026-24683: heap-use-after-free in ainput_send_input_event (bsc#1257990). - CVE-2026-24684: heap-use-after-free in play_thread (bsc#1257991).
Patchnames: SUSE-2026-683,SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-683,SUSE-SLE-Product-WE-15-SP7-2026-683
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
https://www.suse.com/support/security/rating/ external
https://ftp.suse.com/pub/projects/security/csaf/s… self
https://www.suse.com/support/update/announcement/… self
https://lists.suse.com/pipermail/sle-security-upd… self
https://bugzilla.suse.com/1256721 self
https://bugzilla.suse.com/1256723 self
https://bugzilla.suse.com/1256943 self
https://bugzilla.suse.com/1256945 self
https://bugzilla.suse.com/1256946 self
https://bugzilla.suse.com/1256947 self
https://bugzilla.suse.com/1257981 self
https://bugzilla.suse.com/1257982 self
https://bugzilla.suse.com/1257983 self
https://bugzilla.suse.com/1257986 self
https://bugzilla.suse.com/1257988 self
https://bugzilla.suse.com/1257989 self
https://bugzilla.suse.com/1257990 self
https://bugzilla.suse.com/1257991 self
https://www.suse.com/security/cve/CVE-2026-22855/ self
https://www.suse.com/security/cve/CVE-2026-22857/ self
https://www.suse.com/security/cve/CVE-2026-23533/ self
https://www.suse.com/security/cve/CVE-2026-23732/ self
https://www.suse.com/security/cve/CVE-2026-23883/ self
https://www.suse.com/security/cve/CVE-2026-23884/ self
https://www.suse.com/security/cve/CVE-2026-24491/ self
https://www.suse.com/security/cve/CVE-2026-24675/ self
https://www.suse.com/security/cve/CVE-2026-24676/ self
https://www.suse.com/security/cve/CVE-2026-24679/ self
https://www.suse.com/security/cve/CVE-2026-24681/ self
https://www.suse.com/security/cve/CVE-2026-24682/ self
https://www.suse.com/security/cve/CVE-2026-24683/ self
https://www.suse.com/security/cve/CVE-2026-24684/ self
https://www.suse.com/security/cve/CVE-2026-22855 external
https://bugzilla.suse.com/1256721 external
https://www.suse.com/security/cve/CVE-2026-22857 external
https://bugzilla.suse.com/1256723 external
https://www.suse.com/security/cve/CVE-2026-23533 external
https://bugzilla.suse.com/1256943 external
https://www.suse.com/security/cve/CVE-2026-23732 external
https://bugzilla.suse.com/1256945 external
https://www.suse.com/security/cve/CVE-2026-23883 external
https://bugzilla.suse.com/1256946 external
https://www.suse.com/security/cve/CVE-2026-23884 external
https://bugzilla.suse.com/1256947 external
https://www.suse.com/security/cve/CVE-2026-24491 external
https://bugzilla.suse.com/1257981 external
https://www.suse.com/security/cve/CVE-2026-24675 external
https://bugzilla.suse.com/1257982 external
https://www.suse.com/security/cve/CVE-2026-24676 external
https://bugzilla.suse.com/1257983 external
https://www.suse.com/security/cve/CVE-2026-24679 external
https://bugzilla.suse.com/1257986 external
https://www.suse.com/security/cve/CVE-2026-24681 external
https://bugzilla.suse.com/1257988 external
https://www.suse.com/security/cve/CVE-2026-24682 external
https://bugzilla.suse.com/1257989 external
https://www.suse.com/security/cve/CVE-2026-24683 external
https://bugzilla.suse.com/1257990 external
https://www.suse.com/security/cve/CVE-2026-24684 external
https://bugzilla.suse.com/1257991 external

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for freerdp2",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for freerdp2 fixes the following issues:\n\n- CVE-2026-22855: heap-buffer-overflow in smartcard_unpack_set_attrib_call (bsc#1256721).\n- CVE-2026-22857: heap-use-after-free in irp_thread_func (bsc#1256723).\n- CVE-2026-23533: improper validation can lead to heap buffer overflow in `clear_decompress_residual_data`\n  (bsc#1256943).\n- CVE-2026-23732: improper validation can lead to heap buffer overflow in `Glyph_Alloc` (bsc#1256945).\n- CVE-2026-23883: use-after-free when `update_pointer_color` and `freerdp_image_copy_from_pointer_data` fail\n  (bsc#1256946).\n- CVE-2026-23884: use-after-free in `gdi_set_bounds` (bsc#1256947).\n- CVE-2026-24491: heap-use-after-free in video_timer (bsc#1257981).\n- CVE-2026-24675: heap-use-after-free in urb_select_interface (bsc#1257982).\n- CVE-2026-24676: heap-use-after-free in audio_format_compatible (bsc#1257983).\n- CVE-2026-24679: heap-buffer-overflow in urb_select_interface (bsc#1257986).\n- CVE-2026-24681: heap-use-after-free in urb_bulk_transfer_cb (bsc#1257988).\n- CVE-2026-24682: heap-buffer-overflow in audio_formats_free (bsc#1257989).\n- CVE-2026-24683: heap-use-after-free in ainput_send_input_event (bsc#1257990).\n- CVE-2026-24684: heap-use-after-free in play_thread (bsc#1257991).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2026-683,SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-683,SUSE-SLE-Product-WE-15-SP7-2026-683",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0683-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2026:0683-1",
        "url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260683-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2026:0683-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024493.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256721",
        "url": "https://bugzilla.suse.com/1256721"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256723",
        "url": "https://bugzilla.suse.com/1256723"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256943",
        "url": "https://bugzilla.suse.com/1256943"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256945",
        "url": "https://bugzilla.suse.com/1256945"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256946",
        "url": "https://bugzilla.suse.com/1256946"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256947",
        "url": "https://bugzilla.suse.com/1256947"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1257981",
        "url": "https://bugzilla.suse.com/1257981"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1257982",
        "url": "https://bugzilla.suse.com/1257982"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1257983",
        "url": "https://bugzilla.suse.com/1257983"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1257986",
        "url": "https://bugzilla.suse.com/1257986"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1257988",
        "url": "https://bugzilla.suse.com/1257988"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1257989",
        "url": "https://bugzilla.suse.com/1257989"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1257990",
        "url": "https://bugzilla.suse.com/1257990"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1257991",
        "url": "https://bugzilla.suse.com/1257991"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-22855 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-22855/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-22857 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-22857/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-23533 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-23533/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-23732 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-23732/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-23883 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-23883/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-23884 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-23884/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-24491 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-24491/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-24675 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-24675/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-24676 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-24676/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-24679 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-24679/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-24681 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-24681/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-24682 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-24682/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-24683 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-24683/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-24684 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-24684/"
      }
    ],
    "title": "Security update for freerdp2",
    "tracking": {
      "current_release_date": "2026-02-27T10:42:32Z",
      "generator": {
        "date": "2026-02-27T10:42:32Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2026:0683-1",
      "initial_release_date": "2026-02-27T10:42:32Z",
      "revision_history": [
        {
          "date": "2026-02-27T10:42:32Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "freerdp2-2.11.7-150700.3.8.1.aarch64",
                "product": {
                  "name": "freerdp2-2.11.7-150700.3.8.1.aarch64",
                  "product_id": "freerdp2-2.11.7-150700.3.8.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "freerdp2-devel-2.11.7-150700.3.8.1.aarch64",
                "product": {
                  "name": "freerdp2-devel-2.11.7-150700.3.8.1.aarch64",
                  "product_id": "freerdp2-devel-2.11.7-150700.3.8.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "freerdp2-proxy-2.11.7-150700.3.8.1.aarch64",
                "product": {
                  "name": "freerdp2-proxy-2.11.7-150700.3.8.1.aarch64",
                  "product_id": "freerdp2-proxy-2.11.7-150700.3.8.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "freerdp2-server-2.11.7-150700.3.8.1.aarch64",
                "product": {
                  "name": "freerdp2-server-2.11.7-150700.3.8.1.aarch64",
                  "product_id": "freerdp2-server-2.11.7-150700.3.8.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libfreerdp2-2-2.11.7-150700.3.8.1.aarch64",
                "product": {
                  "name": "libfreerdp2-2-2.11.7-150700.3.8.1.aarch64",
                  "product_id": "libfreerdp2-2-2.11.7-150700.3.8.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libwinpr2-2-2.11.7-150700.3.8.1.aarch64",
                "product": {
                  "name": "libwinpr2-2-2.11.7-150700.3.8.1.aarch64",
                  "product_id": "libwinpr2-2-2.11.7-150700.3.8.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "winpr2-devel-2.11.7-150700.3.8.1.aarch64",
                "product": {
                  "name": "winpr2-devel-2.11.7-150700.3.8.1.aarch64",
                  "product_id": "winpr2-devel-2.11.7-150700.3.8.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "freerdp2-2.11.7-150700.3.8.1.i586",
                "product": {
                  "name": "freerdp2-2.11.7-150700.3.8.1.i586",
                  "product_id": "freerdp2-2.11.7-150700.3.8.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "freerdp2-devel-2.11.7-150700.3.8.1.i586",
                "product": {
                  "name": "freerdp2-devel-2.11.7-150700.3.8.1.i586",
                  "product_id": "freerdp2-devel-2.11.7-150700.3.8.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "freerdp2-proxy-2.11.7-150700.3.8.1.i586",
                "product": {
                  "name": "freerdp2-proxy-2.11.7-150700.3.8.1.i586",
                  "product_id": "freerdp2-proxy-2.11.7-150700.3.8.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "freerdp2-server-2.11.7-150700.3.8.1.i586",
                "product": {
                  "name": "freerdp2-server-2.11.7-150700.3.8.1.i586",
                  "product_id": "freerdp2-server-2.11.7-150700.3.8.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "libfreerdp2-2-2.11.7-150700.3.8.1.i586",
                "product": {
                  "name": "libfreerdp2-2-2.11.7-150700.3.8.1.i586",
                  "product_id": "libfreerdp2-2-2.11.7-150700.3.8.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "libwinpr2-2-2.11.7-150700.3.8.1.i586",
                "product": {
                  "name": "libwinpr2-2-2.11.7-150700.3.8.1.i586",
                  "product_id": "libwinpr2-2-2.11.7-150700.3.8.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "winpr2-devel-2.11.7-150700.3.8.1.i586",
                "product": {
                  "name": "winpr2-devel-2.11.7-150700.3.8.1.i586",
                  "product_id": "winpr2-devel-2.11.7-150700.3.8.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "freerdp2-2.11.7-150700.3.8.1.ppc64le",
                "product": {
                  "name": "freerdp2-2.11.7-150700.3.8.1.ppc64le",
                  "product_id": "freerdp2-2.11.7-150700.3.8.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "freerdp2-devel-2.11.7-150700.3.8.1.ppc64le",
                "product": {
                  "name": "freerdp2-devel-2.11.7-150700.3.8.1.ppc64le",
                  "product_id": "freerdp2-devel-2.11.7-150700.3.8.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "freerdp2-proxy-2.11.7-150700.3.8.1.ppc64le",
                "product": {
                  "name": "freerdp2-proxy-2.11.7-150700.3.8.1.ppc64le",
                  "product_id": "freerdp2-proxy-2.11.7-150700.3.8.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "freerdp2-server-2.11.7-150700.3.8.1.ppc64le",
                "product": {
                  "name": "freerdp2-server-2.11.7-150700.3.8.1.ppc64le",
                  "product_id": "freerdp2-server-2.11.7-150700.3.8.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libfreerdp2-2-2.11.7-150700.3.8.1.ppc64le",
                "product": {
                  "name": "libfreerdp2-2-2.11.7-150700.3.8.1.ppc64le",
                  "product_id": "libfreerdp2-2-2.11.7-150700.3.8.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libwinpr2-2-2.11.7-150700.3.8.1.ppc64le",
                "product": {
                  "name": "libwinpr2-2-2.11.7-150700.3.8.1.ppc64le",
                  "product_id": "libwinpr2-2-2.11.7-150700.3.8.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
                "product": {
                  "name": "winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
                  "product_id": "winpr2-devel-2.11.7-150700.3.8.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "freerdp2-2.11.7-150700.3.8.1.s390x",
                "product": {
                  "name": "freerdp2-2.11.7-150700.3.8.1.s390x",
                  "product_id": "freerdp2-2.11.7-150700.3.8.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "freerdp2-devel-2.11.7-150700.3.8.1.s390x",
                "product": {
                  "name": "freerdp2-devel-2.11.7-150700.3.8.1.s390x",
                  "product_id": "freerdp2-devel-2.11.7-150700.3.8.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "freerdp2-proxy-2.11.7-150700.3.8.1.s390x",
                "product": {
                  "name": "freerdp2-proxy-2.11.7-150700.3.8.1.s390x",
                  "product_id": "freerdp2-proxy-2.11.7-150700.3.8.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "freerdp2-server-2.11.7-150700.3.8.1.s390x",
                "product": {
                  "name": "freerdp2-server-2.11.7-150700.3.8.1.s390x",
                  "product_id": "freerdp2-server-2.11.7-150700.3.8.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libfreerdp2-2-2.11.7-150700.3.8.1.s390x",
                "product": {
                  "name": "libfreerdp2-2-2.11.7-150700.3.8.1.s390x",
                  "product_id": "libfreerdp2-2-2.11.7-150700.3.8.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libwinpr2-2-2.11.7-150700.3.8.1.s390x",
                "product": {
                  "name": "libwinpr2-2-2.11.7-150700.3.8.1.s390x",
                  "product_id": "libwinpr2-2-2.11.7-150700.3.8.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "winpr2-devel-2.11.7-150700.3.8.1.s390x",
                "product": {
                  "name": "winpr2-devel-2.11.7-150700.3.8.1.s390x",
                  "product_id": "winpr2-devel-2.11.7-150700.3.8.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "freerdp2-2.11.7-150700.3.8.1.x86_64",
                "product": {
                  "name": "freerdp2-2.11.7-150700.3.8.1.x86_64",
                  "product_id": "freerdp2-2.11.7-150700.3.8.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
                "product": {
                  "name": "freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
                  "product_id": "freerdp2-devel-2.11.7-150700.3.8.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
                "product": {
                  "name": "freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
                  "product_id": "freerdp2-proxy-2.11.7-150700.3.8.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "freerdp2-server-2.11.7-150700.3.8.1.x86_64",
                "product": {
                  "name": "freerdp2-server-2.11.7-150700.3.8.1.x86_64",
                  "product_id": "freerdp2-server-2.11.7-150700.3.8.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
                "product": {
                  "name": "libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
                  "product_id": "libfreerdp2-2-2.11.7-150700.3.8.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
                "product": {
                  "name": "libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
                  "product_id": "libwinpr2-2-2.11.7-150700.3.8.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "winpr2-devel-2.11.7-150700.3.8.1.x86_64",
                "product": {
                  "name": "winpr2-devel-2.11.7-150700.3.8.1.x86_64",
                  "product_id": "winpr2-devel-2.11.7-150700.3.8.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Package Hub 15 SP7",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Package Hub 15 SP7",
                  "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:packagehub:15:sp7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Workstation Extension 15 SP7",
                "product": {
                  "name": "SUSE Linux Enterprise Workstation Extension 15 SP7",
                  "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP7",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-we:15:sp7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "winpr2-devel-2.11.7-150700.3.8.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP7",
          "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64"
        },
        "product_reference": "winpr2-devel-2.11.7-150700.3.8.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "winpr2-devel-2.11.7-150700.3.8.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP7",
          "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le"
        },
        "product_reference": "winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "winpr2-devel-2.11.7-150700.3.8.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP7",
          "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x"
        },
        "product_reference": "winpr2-devel-2.11.7-150700.3.8.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "freerdp2-2.11.7-150700.3.8.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP7",
          "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64"
        },
        "product_reference": "freerdp2-2.11.7-150700.3.8.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "freerdp2-devel-2.11.7-150700.3.8.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP7",
          "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64"
        },
        "product_reference": "freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "freerdp2-proxy-2.11.7-150700.3.8.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP7",
          "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64"
        },
        "product_reference": "freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "freerdp2-server-2.11.7-150700.3.8.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP7",
          "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64"
        },
        "product_reference": "freerdp2-server-2.11.7-150700.3.8.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libfreerdp2-2-2.11.7-150700.3.8.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP7",
          "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64"
        },
        "product_reference": "libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libwinpr2-2-2.11.7-150700.3.8.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP7",
          "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64"
        },
        "product_reference": "libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "winpr2-devel-2.11.7-150700.3.8.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP7",
          "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
        },
        "product_reference": "winpr2-devel-2.11.7-150700.3.8.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP7"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2026-22855",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-22855"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a heap out-of-bounds read occurs in the smartcard SetAttrib path when cbAttrLen does not match the actual NDR buffer length. This vulnerability is fixed in 3.20.1.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-22855",
          "url": "https://www.suse.com/security/cve/CVE-2026-22855"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256721 for CVE-2026-22855",
          "url": "https://bugzilla.suse.com/1256721"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-02-27T10:42:32Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2026-22855"
    },
    {
      "cve": "CVE-2026-22857",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-22857"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a heap use-after-free occurs in irp_thread_func because the IRP is freed by irp-\u003eComplete() and then accessed again on the error path. This vulnerability is fixed in 3.20.1.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-22857",
          "url": "https://www.suse.com/security/cve/CVE-2026-22857"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256723 for CVE-2026-22857",
          "url": "https://bugzilla.suse.com/1256723"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-02-27T10:42:32Z",
          "details": "important"
        }
      ],
      "title": "CVE-2026-22857"
    },
    {
      "cve": "CVE-2026-23533",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-23533"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, a client-side heap buffer overflow occurs in the RDPGFX ClearCodec decode path when maliciously crafted residual data causes out-of-bounds writes during color output. A malicious server can trigger a client-side heap buffer overflow, causing a crash (DoS) and potential heap corruption with code-execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-23533",
          "url": "https://www.suse.com/security/cve/CVE-2026-23533"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256943 for CVE-2026-23533",
          "url": "https://bugzilla.suse.com/1256943"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-02-27T10:42:32Z",
          "details": "important"
        }
      ],
      "title": "CVE-2026-23533"
    },
    {
      "cve": "CVE-2026-23732",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-23732"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, FastGlyph parsing trusts `cbData`/remaining length and never validates against the minimum size implied by `cx/cy`. A malicious server can trigger a client-side global buffer overflow, causing a crash (DoS). Version 3.21.0 contains a patch for the issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-23732",
          "url": "https://www.suse.com/security/cve/CVE-2026-23732"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256945 for CVE-2026-23732",
          "url": "https://bugzilla.suse.com/1256945"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-02-27T10:42:32Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2026-23732"
    },
    {
      "cve": "CVE-2026-23883",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-23883"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, `xf_Pointer_New` frees `cursorPixels` on failure, then `pointer_free` calls `xf_Pointer_Free` and frees it again, triggering ASan UAF. A malicious server can trigger a client-side use after free, causing a crash (DoS) and potential heap corruption with code-execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-23883",
          "url": "https://www.suse.com/security/cve/CVE-2026-23883"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256946 for CVE-2026-23883",
          "url": "https://bugzilla.suse.com/1256946"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-02-27T10:42:32Z",
          "details": "important"
        }
      ],
      "title": "CVE-2026-23883"
    },
    {
      "cve": "CVE-2026-23884",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-23884"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, offscreen bitmap deletion leaves `gdi-\u003edrawing` pointing to freed memory, causing UAF when related update packets arrive. A malicious server can trigger a client-side use after free, causing a crash (DoS) and potential heap corruption with code-execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-23884",
          "url": "https://www.suse.com/security/cve/CVE-2026-23884"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256947 for CVE-2026-23884",
          "url": "https://bugzilla.suse.com/1256947"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-02-27T10:42:32Z",
          "details": "important"
        }
      ],
      "title": "CVE-2026-23884"
    },
    {
      "cve": "CVE-2026-24491",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-24491"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, video_timer can send client notifications after the control channel is closed, dereferencing a freed callback and triggering a use after free. This vulnerability is fixed in 3.22.0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-24491",
          "url": "https://www.suse.com/security/cve/CVE-2026-24491"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1257981 for CVE-2026-24491",
          "url": "https://bugzilla.suse.com/1257981"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-02-27T10:42:32Z",
          "details": "important"
        }
      ],
      "title": "CVE-2026-24491"
    },
    {
      "cve": "CVE-2026-24675",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-24675"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, urb_select_interface can free the device\u0027s MS config on error but later code still dereferences it, leading to a use after free in libusb_udev_select_interface. This vulnerability is fixed in 3.22.0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-24675",
          "url": "https://www.suse.com/security/cve/CVE-2026-24675"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1257982 for CVE-2026-24675",
          "url": "https://bugzilla.suse.com/1257982"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-02-27T10:42:32Z",
          "details": "important"
        }
      ],
      "title": "CVE-2026-24675"
    },
    {
      "cve": "CVE-2026-24676",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-24676"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, AUDIN format renegotiation frees the active format list while the capture thread continues using audin-\u003eformat, leading to a use after free in audio_format_compatible. This vulnerability is fixed in 3.22.0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-24676",
          "url": "https://www.suse.com/security/cve/CVE-2026-24676"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1257983 for CVE-2026-24676",
          "url": "https://bugzilla.suse.com/1257983"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-02-27T10:42:32Z",
          "details": "important"
        }
      ],
      "title": "CVE-2026-24676"
    },
    {
      "cve": "CVE-2026-24679",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-24679"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, The URBDRC client uses server-supplied interface numbers as array indices without bounds checks, causing an out-of-bounds read in libusb_udev_select_interface. This vulnerability is fixed in 3.22.0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-24679",
          "url": "https://www.suse.com/security/cve/CVE-2026-24679"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1257986 for CVE-2026-24679",
          "url": "https://bugzilla.suse.com/1257986"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-02-27T10:42:32Z",
          "details": "important"
        }
      ],
      "title": "CVE-2026-24679"
    },
    {
      "cve": "CVE-2026-24681",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-24681"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, aAsynchronous bulk transfer completions can use a freed channel callback after URBDRC channel close, leading to a use after free in urb_write_completion. This vulnerability is fixed in 3.22.0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-24681",
          "url": "https://www.suse.com/security/cve/CVE-2026-24681"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1257988 for CVE-2026-24681",
          "url": "https://bugzilla.suse.com/1257988"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-02-27T10:42:32Z",
          "details": "important"
        }
      ],
      "title": "CVE-2026-24681"
    },
    {
      "cve": "CVE-2026-24682",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-24682"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, audin_server_recv_formats frees an incorrect number of audio formats on parse failure (i + i), leading to out-of-bounds access in audio_formats_free. This vulnerability is fixed in 3.22.0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-24682",
          "url": "https://www.suse.com/security/cve/CVE-2026-24682"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1257989 for CVE-2026-24682",
          "url": "https://bugzilla.suse.com/1257989"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-02-27T10:42:32Z",
          "details": "important"
        }
      ],
      "title": "CVE-2026-24682"
    },
    {
      "cve": "CVE-2026-24683",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-24683"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "FreeRDP is a free implementation of the Remote Desktop Protocol. ainput_send_input_event caches channel_callback in a local variable and later uses it without synchronization; a concurrent channel close can free or reinitialize the callback, leading to a use after free. Prior to 3.22.0, This vulnerability is fixed in 3.22.0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-24683",
          "url": "https://www.suse.com/security/cve/CVE-2026-24683"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1257990 for CVE-2026-24683",
          "url": "https://bugzilla.suse.com/1257990"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-02-27T10:42:32Z",
          "details": "important"
        }
      ],
      "title": "CVE-2026-24683"
    },
    {
      "cve": "CVE-2026-24684",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-24684"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, the RDPSND async playback thread can process queued PDUs after the channel is closed and internal state is freed, leading to a use after free in rdpsnd_treat_wave. This vulnerability is fixed in 3.22.0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
          "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-24684",
          "url": "https://www.suse.com/security/cve/CVE-2026-24684"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1257991 for CVE-2026-24684",
          "url": "https://bugzilla.suse.com/1257991"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.aarch64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.ppc64le",
            "SUSE Linux Enterprise Module for Package Hub 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.s390x",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-devel-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-proxy-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:freerdp2-server-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libfreerdp2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:libwinpr2-2-2.11.7-150700.3.8.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP7:winpr2-devel-2.11.7-150700.3.8.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-02-27T10:42:32Z",
          "details": "important"
        }
      ],
      "title": "CVE-2026-24684"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…