DEBIAN-CVE-2026-24684

Source
https://security-tracker.debian.org/tracker/CVE-2026-24684
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-24684.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2026-24684
Upstream
Published
2026-02-09T19:15:50.057Z
Modified
2026-02-11T14:42:40.760222Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, the RDPSND async playback thread can process queued PDUs after the channel is closed and internal state is freed, leading to a use after free in rdpsndtreatwave. This vulnerability is fixed in 3.22.0.

References

Affected packages

Debian:11 / freerdp2

Package

Name
freerdp2
Purl
pkg:deb/debian/freerdp2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.3.0+dfsg1-2
2.3.0+dfsg1-2+deb11u1
2.3.0+dfsg1-2+deb11u2
2.3.0+dfsg1-2+deb11u3
2.4.1+dfsg1-1
2.5.0+dfsg1-1
2.6.0+dfsg1-1
2.6.1+dfsg1-1
2.6.1+dfsg1-2
2.6.1+dfsg1-3~bpo11+1
2.6.1+dfsg1-3
2.7.0+dfsg1-1~bpo11+1
2.7.0+dfsg1-1
2.8.0+dfsg1-1
2.8.1+dfsg1-1~bpo11+1
2.8.1+dfsg1-1
2.9.0+dfsg1-1~bpo11+1
2.9.0+dfsg1-1
2.10.0+dfsg1-1~bpo11+1
2.10.0+dfsg1-1
2.10.0+dfsg1-1.1
2.11.2+dfsg1-1
2.11.2+dfsg1-1.1~exp1
2.11.2+dfsg1-1.1~exp2
2.11.5+dfsg1-1
2.11.7+dfsg1-1
2.11.7+dfsg1-2
2.11.7+dfsg1-3
2.11.7+dfsg1-4
2.11.7+dfsg1-5
2.11.7+dfsg1-6~deb12u1
2.11.7+dfsg1-6

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-24684.json"

Debian:12 / freerdp2

Package

Name
freerdp2
Purl
pkg:deb/debian/freerdp2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.10.0+dfsg1-1
2.10.0+dfsg1-1.1
2.11.2+dfsg1-1
2.11.2+dfsg1-1.1~exp1
2.11.2+dfsg1-1.1~exp2
2.11.5+dfsg1-1
2.11.7+dfsg1-1
2.11.7+dfsg1-2
2.11.7+dfsg1-3
2.11.7+dfsg1-4
2.11.7+dfsg1-5
2.11.7+dfsg1-6~deb12u1
2.11.7+dfsg1-6

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-24684.json"

Debian:13 / freerdp3

Package

Name
freerdp3
Purl
pkg:deb/debian/freerdp3?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.15.0+dfsg-2.1
3.16.0+dfsg-1
3.16.0+dfsg-2
3.17.0+dfsg-1
3.17.1+dfsg-1
3.17.1+dfsg-2
3.17.2+dfsg-1
3.17.2+dfsg-2
3.17.2+dfsg-3
3.18.0+dfsg-1
3.19.0+dfsg-1
3.19.1+dfsg-1
3.20.0+dfsg-1
3.20.2+dfsg-1
3.21.0+dfsg-1
3.22.0+dfsg-1~bpo13+0
3.22.0+dfsg-1~bpo13+1
3.22.0+dfsg-1
3.22.0+dfsg-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-24684.json"

Debian:14 / freerdp3

Package

Name
freerdp3
Purl
pkg:deb/debian/freerdp3?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.22.0+dfsg-1

Affected versions

3.*
3.15.0+dfsg-2.1
3.16.0+dfsg-1
3.16.0+dfsg-2
3.17.0+dfsg-1
3.17.1+dfsg-1
3.17.1+dfsg-2
3.17.2+dfsg-1
3.17.2+dfsg-2
3.17.2+dfsg-3
3.18.0+dfsg-1
3.19.0+dfsg-1
3.19.1+dfsg-1
3.20.0+dfsg-1
3.20.2+dfsg-1
3.21.0+dfsg-1
3.22.0+dfsg-1~bpo13+0
3.22.0+dfsg-1~bpo13+1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-24684.json"