{"id":"USN-8042-1","summary":"freerdp2, freerdp3 vulnerabilities","details":"It was discovered that FreeRDP incorrectly handled memory under certain\ncircumstances, which could lead to a NULL pointer dereference. An\nattacker could possibly use this issue to cause a denial of service.\n(CVE-2026-23948)\n\nIt was discovered that FreeRDP did not correctly validate the size of\ncertain variables, which could cause a buffer overflow. An attacker could\npossibly use this issue to cause a denial of service or execute arbitrary\ncode. This issue only affected FreeRDP3 in Ubuntu 24.04 LTS and Ubuntu\n25.10. (CVE-2026-24491)\n\nIt was discovered that FreeRDP did not correctly validate the size of\ncertain variables, which could cause a buffer overflow. An attacker could\npossibly use this issue to cause a denial of service or execute arbitrary\ncode. (CVE-2026-24675, CVE-2026-24679, CVE-2026-24682)\n\nIt was discovered that FreeRDP had a use after free vulnerability under\ncertain circumstances. An attacker could use this to cause a denial of\nservice or possibly execute arbitrary code. (CVE-2026-24676,\nCVE-2026-24681)\n\nIt was discovered that FreeRDP did not correctly validate the size of\ncertain variables, which could cause a buffer overflow. An attacker could\npossibly use this issue to cause a denial of service or execute arbitrary\ncode. This issue only affected Ubuntu 25.10. (CVE-2026-24677)\n\nIt was discovered that FreeRDP had a use after free vulnerability under\ncertain circumstances. An attacker could use this to cause a denial of\nservice or possibly execute arbitrary code. This issue only affected\nUbuntu 25.10. (CVE-2026-24678)\n\nIt was discovered that FreeRDP had a use after free vulnerability under\ncertain circumstances. An attacker could use this to cause a denial of\nservice or possibly execute arbitrary code. This issue only affected\nFreeRDP3 in Ubuntu 24.04 LTS and Ubuntu 25.10. (CVE-2026-24680)\n\nIt was discovered that FreeRDP had a use after free vulnerability under\ncertain circumstances. An attacker could use this to cause a denial of\nservice or possibly execute arbitrary code. This issue only affected\nUbuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS and Ubuntu 25.10.\n(CVE-2026-24683, CVE-2026-24684)","modified":"2026-04-27T18:47:22.890289025Z","published":"2026-02-16T10:04:47Z","related":["UBUNTU-CVE-2026-23948","UBUNTU-CVE-2026-24491","UBUNTU-CVE-2026-24675","UBUNTU-CVE-2026-24676","UBUNTU-CVE-2026-24677","UBUNTU-CVE-2026-24678","UBUNTU-CVE-2026-24679","UBUNTU-CVE-2026-24680","UBUNTU-CVE-2026-24681","UBUNTU-CVE-2026-24682","UBUNTU-CVE-2026-24683","UBUNTU-CVE-2026-24684"],"upstream":["CVE-2026-23948","CVE-2026-24491","CVE-2026-24675","CVE-2026-24676","CVE-2026-24677","CVE-2026-24678","CVE-2026-24679","CVE-2026-24680","CVE-2026-24681","CVE-2026-24682","CVE-2026-24683","CVE-2026-24684","UBUNTU-CVE-2026-23948","UBUNTU-CVE-2026-24491","UBUNTU-CVE-2026-24675","UBUNTU-CVE-2026-24676","UBUNTU-CVE-2026-24677","UBUNTU-CVE-2026-24678","UBUNTU-CVE-2026-24679","UBUNTU-CVE-2026-24680","UBUNTU-CVE-2026-24681","UBUNTU-CVE-2026-24682","UBUNTU-CVE-2026-24683","UBUNTU-CVE-2026-24684"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-8042-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-23948"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-24491"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-24675"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-24676"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-24677"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-24678"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-24679"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-24680"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-24681"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-24682"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-24683"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2026-24684"}],"affected":[{"package":{"name":"freerdp2","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/freerdp2@2.2.0+dfsg1-0ubuntu0.18.04.4+esm5?arch=source&distro=esm-infra/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.2.0+dfsg1-0ubuntu0.18.04.4+esm5"}]}],"versions":["2.0.0~git20170725.1.1648deb+dfsg1-1","2.0.0~git20170725.1.1648deb+dfsg1-5","2.0.0~git20170725.1.1648deb+dfsg1-5ubuntu1","2.0.0~git20170725.1.1648deb+dfsg1-5ubuntu2","2.0.0~git20170725.1.1648deb+dfsg1-6","2.0.0~git20170725.1.1648deb+dfsg1-6build1","2.0.0~git20170725.1.1648deb+dfsg1-7","2.0.0~git20170725.1.1648deb+dfsg1-7ubuntu0.1","2.1.1+dfsg1-0ubuntu0.18.04.1","2.2.0+dfsg1-0ubuntu0.18.04.1","2.2.0+dfsg1-0ubuntu0.18.04.2","2.2.0+dfsg1-0ubuntu0.18.04.3","2.2.0+dfsg1-0ubuntu0.18.04.4","2.2.0+dfsg1-0ubuntu0.18.04.4+esm1","2.2.0+dfsg1-0ubuntu0.18.04.4+esm2","2.2.0+dfsg1-0ubuntu0.18.04.4+esm3","2.2.0+dfsg1-0ubuntu0.18.04.4+esm4"],"ecosystem_specific":{"binaries":[{"binary_name":"freerdp2-shadow-x11","binary_version":"2.2.0+dfsg1-0ubuntu0.18.04.4+esm5"},{"binary_version":"2.2.0+dfsg1-0ubuntu0.18.04.4+esm5","binary_name":"freerdp2-wayland"},{"binary_version":"2.2.0+dfsg1-0ubuntu0.18.04.4+esm5","binary_name":"freerdp2-x11"},{"binary_version":"2.2.0+dfsg1-0ubuntu0.18.04.4+esm5","binary_name":"libfreerdp-client2-2"},{"binary_version":"2.2.0+dfsg1-0ubuntu0.18.04.4+esm5","binary_name":"libfreerdp-server2-2"},{"binary_version":"2.2.0+dfsg1-0ubuntu0.18.04.4+esm5","binary_name":"libfreerdp-shadow-subsystem2-2"},{"binary_version":"2.2.0+dfsg1-0ubuntu0.18.04.4+esm5","binary_name":"libfreerdp-shadow2-2"},{"binary_version":"2.2.0+dfsg1-0ubuntu0.18.04.4+esm5","binary_name":"libfreerdp2-2"},{"binary_version":"2.2.0+dfsg1-0ubuntu0.18.04.4+esm5","binary_name":"libuwac0-0"},{"binary_version":"2.2.0+dfsg1-0ubuntu0.18.04.4+esm5","binary_name":"libwinpr-tools2-2"},{"binary_version":"2.2.0+dfsg1-0ubuntu0.18.04.4+esm5","binary_name":"libwinpr2-2"},{"binary_version":"2.2.0+dfsg1-0ubuntu0.18.04.4+esm5","binary_name":"winpr-utils"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8042-1.json","cves_map":{"cves":[{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-23948"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24675"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24676"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24679"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24681"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24682"}],"ecosystem":"Ubuntu:Pro:18.04:LTS"}}},{"package":{"name":"freerdp2","ecosystem":"Ubuntu:Pro:20.04:LTS","purl":"pkg:deb/ubuntu/freerdp2@2.6.1+dfsg1-0ubuntu0.20.04.2+esm3?arch=source&distro=esm-infra/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.6.1+dfsg1-0ubuntu0.20.04.2+esm3"}]}],"versions":["2.0.0~git20190204.1.2693389a+dfsg1-1","2.0.0~git20190204.1.2693389a+dfsg1-2","2.0.0~git20190204.1.2693389a+dfsg1-2build1","2.0.0~git20190204.1.2693389a+dfsg1-2build2","2.1.1+dfsg1-0ubuntu0.20.04.1","2.2.0+dfsg1-0ubuntu0.20.04.1","2.2.0+dfsg1-0ubuntu0.20.04.2","2.2.0+dfsg1-0ubuntu0.20.04.3","2.2.0+dfsg1-0ubuntu0.20.04.4","2.2.0+dfsg1-0ubuntu0.20.04.5","2.2.0+dfsg1-0ubuntu0.20.04.6","2.6.1+dfsg1-0ubuntu0.20.04.1","2.6.1+dfsg1-0ubuntu0.20.04.2","2.6.1+dfsg1-0ubuntu0.20.04.2+esm1","2.6.1+dfsg1-0ubuntu0.20.04.2+esm2"],"ecosystem_specific":{"binaries":[{"binary_version":"2.6.1+dfsg1-0ubuntu0.20.04.2+esm3","binary_name":"freerdp2-shadow-x11"},{"binary_version":"2.6.1+dfsg1-0ubuntu0.20.04.2+esm3","binary_name":"freerdp2-wayland"},{"binary_version":"2.6.1+dfsg1-0ubuntu0.20.04.2+esm3","binary_name":"freerdp2-x11"},{"binary_version":"2.6.1+dfsg1-0ubuntu0.20.04.2+esm3","binary_name":"libfreerdp-client2-2"},{"binary_version":"2.6.1+dfsg1-0ubuntu0.20.04.2+esm3","binary_name":"libfreerdp-server2-2"},{"binary_version":"2.6.1+dfsg1-0ubuntu0.20.04.2+esm3","binary_name":"libfreerdp-shadow-subsystem2-2"},{"binary_version":"2.6.1+dfsg1-0ubuntu0.20.04.2+esm3","binary_name":"libfreerdp-shadow2-2"},{"binary_version":"2.6.1+dfsg1-0ubuntu0.20.04.2+esm3","binary_name":"libfreerdp2-2"},{"binary_version":"2.6.1+dfsg1-0ubuntu0.20.04.2+esm3","binary_name":"libuwac0-0"},{"binary_version":"2.6.1+dfsg1-0ubuntu0.20.04.2+esm3","binary_name":"libwinpr-tools2-2"},{"binary_name":"libwinpr2-2","binary_version":"2.6.1+dfsg1-0ubuntu0.20.04.2+esm3"},{"binary_name":"winpr-utils","binary_version":"2.6.1+dfsg1-0ubuntu0.20.04.2+esm3"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8042-1.json","cves_map":{"cves":[{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-23948"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24675"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24676"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24679"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24681"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24682"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24683"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24684"}],"ecosystem":"Ubuntu:Pro:20.04:LTS"}}},{"package":{"name":"freerdp2","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/freerdp2@2.6.1+dfsg1-3ubuntu2.10?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.6.1+dfsg1-3ubuntu2.10"}]}],"versions":["2.3.0+dfsg1-2build1","2.3.0+dfsg1-2ubuntu1","2.3.0+dfsg1-2ubuntu2","2.4.1+dfsg1-1","2.4.1+dfsg1-1ubuntu1","2.4.1+dfsg1-1ubuntu2","2.5.0+dfsg1-1","2.6.0+dfsg1-1","2.6.1+dfsg1-1","2.6.1+dfsg1-3","2.6.1+dfsg1-3ubuntu1","2.6.1+dfsg1-3ubuntu2","2.6.1+dfsg1-3ubuntu2.1","2.6.1+dfsg1-3ubuntu2.2","2.6.1+dfsg1-3ubuntu2.3","2.6.1+dfsg1-3ubuntu2.4","2.6.1+dfsg1-3ubuntu2.5","2.6.1+dfsg1-3ubuntu2.6","2.6.1+dfsg1-3ubuntu2.7","2.6.1+dfsg1-3ubuntu2.8","2.6.1+dfsg1-3ubuntu2.9"],"ecosystem_specific":{"binaries":[{"binary_version":"2.6.1+dfsg1-3ubuntu2.10","binary_name":"freerdp2-shadow-x11"},{"binary_version":"2.6.1+dfsg1-3ubuntu2.10","binary_name":"freerdp2-wayland"},{"binary_version":"2.6.1+dfsg1-3ubuntu2.10","binary_name":"freerdp2-x11"},{"binary_name":"libfreerdp-client2-2","binary_version":"2.6.1+dfsg1-3ubuntu2.10"},{"binary_version":"2.6.1+dfsg1-3ubuntu2.10","binary_name":"libfreerdp-server2-2"},{"binary_name":"libfreerdp-shadow-subsystem2-2","binary_version":"2.6.1+dfsg1-3ubuntu2.10"},{"binary_version":"2.6.1+dfsg1-3ubuntu2.10","binary_name":"libfreerdp-shadow2-2"},{"binary_version":"2.6.1+dfsg1-3ubuntu2.10","binary_name":"libfreerdp2-2"},{"binary_version":"2.6.1+dfsg1-3ubuntu2.10","binary_name":"libuwac0-0"},{"binary_version":"2.6.1+dfsg1-3ubuntu2.10","binary_name":"libwinpr-tools2-2"},{"binary_version":"2.6.1+dfsg1-3ubuntu2.10","binary_name":"libwinpr2-2"},{"binary_version":"2.6.1+dfsg1-3ubuntu2.10","binary_name":"winpr-utils"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8042-1.json","cves_map":{"cves":[{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-23948"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24675"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24676"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24679"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24681"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24682"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24683"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24684"}],"ecosystem":"Ubuntu:22.04:LTS"}}},{"package":{"name":"freerdp3","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/freerdp3@3.5.1+dfsg1-0ubuntu1.2?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.5.1+dfsg1-0ubuntu1.2"}]}],"versions":["3.4.0+dfsg1-0ubuntu2","3.4.0+dfsg1-0ubuntu3","3.4.0+dfsg1-0ubuntu4","3.5.0+dfsg1-0ubuntu1","3.5.1+dfsg1-0ubuntu1","3.5.1+dfsg1-0ubuntu1.1"],"ecosystem_specific":{"binaries":[{"binary_version":"3.5.1+dfsg1-0ubuntu1.2","binary_name":"freerdp3-shadow-x11"},{"binary_version":"3.5.1+dfsg1-0ubuntu1.2","binary_name":"freerdp3-wayland"},{"binary_version":"3.5.1+dfsg1-0ubuntu1.2","binary_name":"freerdp3-x11"},{"binary_name":"libfreerdp-client3-3","binary_version":"3.5.1+dfsg1-0ubuntu1.2"},{"binary_version":"3.5.1+dfsg1-0ubuntu1.2","binary_name":"libfreerdp-server3-3"},{"binary_version":"3.5.1+dfsg1-0ubuntu1.2","binary_name":"libfreerdp-shadow-subsystem3-3"},{"binary_name":"libfreerdp-shadow3-3","binary_version":"3.5.1+dfsg1-0ubuntu1.2"},{"binary_version":"3.5.1+dfsg1-0ubuntu1.2","binary_name":"libfreerdp3-3"},{"binary_version":"3.5.1+dfsg1-0ubuntu1.2","binary_name":"libwinpr-tools3-3"},{"binary_version":"3.5.1+dfsg1-0ubuntu1.2","binary_name":"libwinpr3-3"},{"binary_version":"3.5.1+dfsg1-0ubuntu1.2","binary_name":"winpr3-utils"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8042-1.json","cves_map":{"cves":[{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-23948"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24491"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24675"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24676"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24679"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24680"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24681"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24682"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24683"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24684"}],"ecosystem":"Ubuntu:24.04:LTS"}}},{"package":{"name":"freerdp2","ecosystem":"Ubuntu:Pro:24.04:LTS","purl":"pkg:deb/ubuntu/freerdp2@2.11.5+dfsg1-1ubuntu0.1~esm5?arch=source&distro=esm-apps/noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.11.5+dfsg1-1ubuntu0.1~esm5"}]}],"versions":["2.10.0+dfsg1-1.1ubuntu1","2.11.2+dfsg1-1","2.11.2+dfsg1-1build1","2.11.2+dfsg1-1build3","2.11.5+dfsg1-1build1","2.11.5+dfsg1-1build2","2.11.5+dfsg1-1ubuntu0.1~esm1","2.11.5+dfsg1-1ubuntu0.1~esm2","2.11.5+dfsg1-1ubuntu0.1~esm3","2.11.5+dfsg1-1ubuntu0.1~esm4"],"ecosystem_specific":{"binaries":[{"binary_version":"2.11.5+dfsg1-1ubuntu0.1~esm5","binary_name":"freerdp2-shadow-x11"},{"binary_name":"freerdp2-wayland","binary_version":"2.11.5+dfsg1-1ubuntu0.1~esm5"},{"binary_version":"2.11.5+dfsg1-1ubuntu0.1~esm5","binary_name":"freerdp2-x11"},{"binary_version":"2.11.5+dfsg1-1ubuntu0.1~esm5","binary_name":"libfreerdp-client2-2t64"},{"binary_version":"2.11.5+dfsg1-1ubuntu0.1~esm5","binary_name":"libfreerdp-server2-2t64"},{"binary_version":"2.11.5+dfsg1-1ubuntu0.1~esm5","binary_name":"libfreerdp-shadow-subsystem2-2t64"},{"binary_version":"2.11.5+dfsg1-1ubuntu0.1~esm5","binary_name":"libfreerdp-shadow2-2t64"},{"binary_version":"2.11.5+dfsg1-1ubuntu0.1~esm5","binary_name":"libfreerdp2-2t64"},{"binary_version":"2.11.5+dfsg1-1ubuntu0.1~esm5","binary_name":"libuwac0-0t64"},{"binary_version":"2.11.5+dfsg1-1ubuntu0.1~esm5","binary_name":"libwinpr-tools2-2t64"},{"binary_version":"2.11.5+dfsg1-1ubuntu0.1~esm5","binary_name":"libwinpr2-2t64"},{"binary_version":"2.11.5+dfsg1-1ubuntu0.1~esm5","binary_name":"winpr-utils"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8042-1.json","cves_map":{"cves":[{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-23948"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24675"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24676"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24679"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24681"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24682"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24683"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24684"}],"ecosystem":"Ubuntu:Pro:24.04:LTS"}}},{"package":{"name":"freerdp3","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/freerdp3@3.16.0+dfsg-2ubuntu0.1?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.16.0+dfsg-2ubuntu0.1"}]}],"versions":["3.14.0+dfsg-1ubuntu1","3.15.0+dfsg-2.1","3.16.0+dfsg-1ubuntu1","3.16.0+dfsg-2"],"ecosystem_specific":{"binaries":[{"binary_version":"3.16.0+dfsg-2ubuntu0.1","binary_name":"freerdp3-proxy"},{"binary_version":"3.16.0+dfsg-2ubuntu0.1","binary_name":"freerdp3-proxy-modules"},{"binary_version":"3.16.0+dfsg-2ubuntu0.1","binary_name":"freerdp3-sdl"},{"binary_version":"3.16.0+dfsg-2ubuntu0.1","binary_name":"freerdp3-shadow-x11"},{"binary_version":"3.16.0+dfsg-2ubuntu0.1","binary_name":"freerdp3-wayland"},{"binary_version":"3.16.0+dfsg-2ubuntu0.1","binary_name":"freerdp3-x11"},{"binary_version":"3.16.0+dfsg-2ubuntu0.1","binary_name":"libfreerdp-client3-3"},{"binary_version":"3.16.0+dfsg-2ubuntu0.1","binary_name":"libfreerdp-server-proxy3-3"},{"binary_version":"3.16.0+dfsg-2ubuntu0.1","binary_name":"libfreerdp-server3-3"},{"binary_version":"3.16.0+dfsg-2ubuntu0.1","binary_name":"libfreerdp-shadow-subsystem3-3"},{"binary_version":"3.16.0+dfsg-2ubuntu0.1","binary_name":"libfreerdp-shadow3-3"},{"binary_version":"3.16.0+dfsg-2ubuntu0.1","binary_name":"libfreerdp3-3"},{"binary_version":"3.16.0+dfsg-2ubuntu0.1","binary_name":"libwinpr-tools3-3"},{"binary_version":"3.16.0+dfsg-2ubuntu0.1","binary_name":"libwinpr3-3"},{"binary_version":"3.16.0+dfsg-2ubuntu0.1","binary_name":"winpr3-utils"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8042-1.json","cves_map":{"cves":[{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-23948"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24491"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24675"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24676"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24677"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24678"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24679"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24680"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24681"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24682"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24683"},{"severity":[{"score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","type":"CVSS_V4"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2026-24684"}],"ecosystem":"Ubuntu:25.10"}}}],"schema_version":"1.7.5"}