FreeRDP is a free implementation of the Remote Desktop Protocol. ainput_send_input_event caches channel_callback in a local variable and later uses it without synchronization; a concurrent channel close can free or reinitialize the callback, leading to a use after free. Prior to 3.22.0, This vulnerability is fixed in 3.22.0.
References
| Link | Resource |
|---|---|
| https://github.com/FreeRDP/FreeRDP/commit/d9ca272dce7a776ab475e9b1a8e8c3d2968c8486 | Patch |
| https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-45pf-68pj-fg8q | Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-02-09 19:15
Updated : 2026-02-10 15:03
NVD link : CVE-2026-24683
Mitre link : CVE-2026-24683
CVE.ORG link : CVE-2026-24683
JSON object : View
Products Affected
freerdp
- freerdp
CWE
CWE-416
Use After Free
