UBUNTU-CVE-2026-24678

Source
https://ubuntu.com/security/CVE-2026-24678
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-24678.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2026-24678
Upstream
Downstream
Related
Published
2026-02-09T19:15:00Z
Modified
2026-02-17T21:43:54.707806Z
Severity
  • 8.7 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N CVSS Calculator
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, A capture thread sends sample responses using a freed channel callback after a device channel close, leading to a use after free in ecamchannelwrite. This vulnerability is fixed in 3.22.0.

References

Affected packages

Ubuntu:25.10 / freerdp3

Package

Name
freerdp3
Purl
pkg:deb/ubuntu/freerdp3@3.16.0+dfsg-2ubuntu0.1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.16.0+dfsg-2ubuntu0.1

Affected versions

3.*
3.14.0+dfsg-1ubuntu1
3.15.0+dfsg-2.1
3.16.0+dfsg-1ubuntu1
3.16.0+dfsg-2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.16.0+dfsg-2ubuntu0.1",
            "binary_name": "freerdp3-dev"
        },
        {
            "binary_version": "3.16.0+dfsg-2ubuntu0.1",
            "binary_name": "freerdp3-proxy"
        },
        {
            "binary_version": "3.16.0+dfsg-2ubuntu0.1",
            "binary_name": "freerdp3-proxy-modules"
        },
        {
            "binary_version": "3.16.0+dfsg-2ubuntu0.1",
            "binary_name": "freerdp3-sdl"
        },
        {
            "binary_version": "3.16.0+dfsg-2ubuntu0.1",
            "binary_name": "freerdp3-shadow-x11"
        },
        {
            "binary_version": "3.16.0+dfsg-2ubuntu0.1",
            "binary_name": "freerdp3-wayland"
        },
        {
            "binary_version": "3.16.0+dfsg-2ubuntu0.1",
            "binary_name": "freerdp3-x11"
        },
        {
            "binary_version": "3.16.0+dfsg-2ubuntu0.1",
            "binary_name": "libfreerdp-client3-3"
        },
        {
            "binary_version": "3.16.0+dfsg-2ubuntu0.1",
            "binary_name": "libfreerdp-server-proxy3-3"
        },
        {
            "binary_version": "3.16.0+dfsg-2ubuntu0.1",
            "binary_name": "libfreerdp-server3-3"
        },
        {
            "binary_version": "3.16.0+dfsg-2ubuntu0.1",
            "binary_name": "libfreerdp-shadow-subsystem3-3"
        },
        {
            "binary_version": "3.16.0+dfsg-2ubuntu0.1",
            "binary_name": "libfreerdp-shadow3-3"
        },
        {
            "binary_version": "3.16.0+dfsg-2ubuntu0.1",
            "binary_name": "libfreerdp3-3"
        },
        {
            "binary_version": "3.16.0+dfsg-2ubuntu0.1",
            "binary_name": "libwinpr-tools3-3"
        },
        {
            "binary_version": "3.16.0+dfsg-2ubuntu0.1",
            "binary_name": "libwinpr3-3"
        },
        {
            "binary_version": "3.16.0+dfsg-2ubuntu0.1",
            "binary_name": "libwinpr3-dev"
        },
        {
            "binary_version": "3.16.0+dfsg-2ubuntu0.1",
            "binary_name": "winpr3-utils"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-24678.json"