{"id":"UBUNTU-CVE-2026-24491","details":"FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, video_timer can send client notifications after the control channel is closed, dereferencing a freed callback and triggering a use after free. This vulnerability is fixed in 3.22.0.","modified":"2026-02-17T21:29:13.175287Z","published":"2026-02-09T19:15:00Z","related":["USN-8042-1"],"upstream":["CVE-2026-24491"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-24491"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2026-24491"},{"type":"REPORT","url":"https://github.com/FreeRDP/FreeRDP/commit/e02e052f6692550e539d10f99de9c35a23492db2"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-8042-1"}],"affected":[{"package":{"name":"freerdp3","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/freerdp3@3.5.1+dfsg1-0ubuntu1.2?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.5.1+dfsg1-0ubuntu1.2"}]}],"versions":["3.4.0+dfsg1-0ubuntu2","3.4.0+dfsg1-0ubuntu3","3.4.0+dfsg1-0ubuntu4","3.5.0+dfsg1-0ubuntu1","3.5.1+dfsg1-0ubuntu1","3.5.1+dfsg1-0ubuntu1.1"],"ecosystem_specific":{"binaries":[{"binary_version":"3.5.1+dfsg1-0ubuntu1.2","binary_name":"freerdp3-dev"},{"binary_version":"3.5.1+dfsg1-0ubuntu1.2","binary_name":"freerdp3-shadow-x11"},{"binary_version":"3.5.1+dfsg1-0ubuntu1.2","binary_name":"freerdp3-wayland"},{"binary_version":"3.5.1+dfsg1-0ubuntu1.2","binary_name":"freerdp3-x11"},{"binary_version":"3.5.1+dfsg1-0ubuntu1.2","binary_name":"libfreerdp-client3-3"},{"binary_version":"3.5.1+dfsg1-0ubuntu1.2","binary_name":"libfreerdp-server3-3"},{"binary_version":"3.5.1+dfsg1-0ubuntu1.2","binary_name":"libfreerdp-shadow-subsystem3-3"},{"binary_version":"3.5.1+dfsg1-0ubuntu1.2","binary_name":"libfreerdp-shadow3-3"},{"binary_version":"3.5.1+dfsg1-0ubuntu1.2","binary_name":"libfreerdp3-3"},{"binary_version":"3.5.1+dfsg1-0ubuntu1.2","binary_name":"libwinpr-tools3-3"},{"binary_version":"3.5.1+dfsg1-0ubuntu1.2","binary_name":"libwinpr3-3"},{"binary_version":"3.5.1+dfsg1-0ubuntu1.2","binary_name":"libwinpr3-dev"},{"binary_version":"3.5.1+dfsg1-0ubuntu1.2","binary_name":"winpr3-utils"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-24491.json"}},{"package":{"name":"freerdp3","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/freerdp3@3.16.0+dfsg-2ubuntu0.1?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.16.0+dfsg-2ubuntu0.1"}]}],"versions":["3.14.0+dfsg-1ubuntu1","3.15.0+dfsg-2.1","3.16.0+dfsg-1ubuntu1","3.16.0+dfsg-2"],"ecosystem_specific":{"binaries":[{"binary_version":"3.16.0+dfsg-2ubuntu0.1","binary_name":"freerdp3-dev"},{"binary_version":"3.16.0+dfsg-2ubuntu0.1","binary_name":"freerdp3-proxy"},{"binary_version":"3.16.0+dfsg-2ubuntu0.1","binary_name":"freerdp3-proxy-modules"},{"binary_version":"3.16.0+dfsg-2ubuntu0.1","binary_name":"freerdp3-sdl"},{"binary_version":"3.16.0+dfsg-2ubuntu0.1","binary_name":"freerdp3-shadow-x11"},{"binary_version":"3.16.0+dfsg-2ubuntu0.1","binary_name":"freerdp3-wayland"},{"binary_version":"3.16.0+dfsg-2ubuntu0.1","binary_name":"freerdp3-x11"},{"binary_version":"3.16.0+dfsg-2ubuntu0.1","binary_name":"libfreerdp-client3-3"},{"binary_version":"3.16.0+dfsg-2ubuntu0.1","binary_name":"libfreerdp-server-proxy3-3"},{"binary_version":"3.16.0+dfsg-2ubuntu0.1","binary_name":"libfreerdp-server3-3"},{"binary_version":"3.16.0+dfsg-2ubuntu0.1","binary_name":"libfreerdp-shadow-subsystem3-3"},{"binary_version":"3.16.0+dfsg-2ubuntu0.1","binary_name":"libfreerdp-shadow3-3"},{"binary_version":"3.16.0+dfsg-2ubuntu0.1","binary_name":"libfreerdp3-3"},{"binary_version":"3.16.0+dfsg-2ubuntu0.1","binary_name":"libwinpr-tools3-3"},{"binary_version":"3.16.0+dfsg-2ubuntu0.1","binary_name":"libwinpr3-3"},{"binary_version":"3.16.0+dfsg-2ubuntu0.1","binary_name":"libwinpr3-dev"},{"binary_version":"3.16.0+dfsg-2ubuntu0.1","binary_name":"winpr3-utils"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-24491.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}