[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1052646: marked as done (xrdp: New release with security fixes)



Your message dated Sun, 17 Mar 2024 20:15:59 +0100
with message-id <ea80d401426e527f44e81eb0ae7a20fa@phys.ethz.ch>
and subject line xrdp: New release with security fixes
has caused the Debian Bug report #1052646,
regarding xrdp: New release with security fixes
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1052646: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1052646
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Source: xrdp
Version: 0.9.21.1-1
Severity: important
X-Debbugs-Cc: stephen@jadevine.org.uk

Dear Maintainer,

A new version of xrdp - 0.9.23 - was released on 2023/08/31 which
contains an important security fix for CVE-2023-40184: "Improper
handling of session establishment errors allows bypassing OS-level
session restrictions". I just wanted to check, will this be available
in unstable soon and backported to stable?

Thanks for your work on maintaining the xrdp package, it's much
appreciated!

Regards,

Stephen Quinney

-- System Information:
Debian Release: 12.1
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 6.1.0-12-amd64 (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE=en_GB:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

--- End Message ---
--- Begin Message ---
Hi Stephen

Thanks for the report, this has been fixed with:

xrdp (0.9.24-1) experimental; urgency=medium

  * New upstream version. (Closes: #1053284, #1051061)
    (CVE-2023-42822 and CVE-2023-40184)

--- End Message ---

Reply to: