CVE-2026-22851

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a race condition between the RDPGFX dynamic virtual channel thread and the SDL render thread leads to a heap use-after-free. Specifically, an escaped pointer to sdl->primary (SDL_Surface) is accessed after it has been freed during RDPGFX ResetGraphics handling. This vulnerability is fixed in 3.20.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*

History

20 Jan 2026, 18:43

Type Values Removed Values Added
First Time Freerdp
Freerdp freerdp
CPE cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.9
References () https://github.com/FreeRDP/FreeRDP/releases/tag/3.20.1 - () https://github.com/FreeRDP/FreeRDP/releases/tag/3.20.1 - Release Notes
References () https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8g87-6pvc-wh99 - () https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8g87-6pvc-wh99 - Exploit, Vendor Advisory

14 Jan 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-14 18:16

Updated : 2026-01-20 18:43


NVD link : CVE-2026-22851

Mitre link : CVE-2026-22851

CVE.ORG link : CVE-2026-22851


JSON object : View

Products Affected

freerdp

  • freerdp
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

CWE-416

Use After Free