- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3375-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                           Chris Lamb
March 31, 2023                                https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : xrdp
Version        : 0.9.9-1+deb10u3
CVE IDs        : CVE-2022-23480 CVE-2022-23481 CVE-2022-23482
Debian Bug     : 1025879

It was discovered that there were a number of vulnerabilies in the
xrdp Remote Desktop Protocol (RDP) server:

* CVE-2022-23480: Prevent a series of potential buffer overflow
  vulnerabilities in the devredir_proc_client_devlist_announce_req()
  function.

* CVE-2022-23481: Fix an out-of-bounds read vulnerability in the
  xrdp_caps_process_confirm_active() function.

* CVE-2022-23482: Fix an out-of-bounds read vulnerability in the
  xrdp_sec_process_mcs_data_CS_CORE() function.

For Debian 10 buster, these problems have been fixed in version
0.9.9-1+deb10u3.

We recommend that you upgrade your xrdp packages.

For the detailed security status of xrdp please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/xrdp

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-3375-1: xrdp security update

March 31, 2023
It was discovered that there were a number of vulnerabilies in the xrdp Remote Desktop Protocol (RDP) server: * CVE-2022-23480: Prevent a series of potential buffer overflow

Summary

* CVE-2022-23480: Prevent a series of potential buffer overflow
vulnerabilities in the devredir_proc_client_devlist_announce_req()
function.

* CVE-2022-23481: Fix an out-of-bounds read vulnerability in the
xrdp_caps_process_confirm_active() function.

* CVE-2022-23482: Fix an out-of-bounds read vulnerability in the
xrdp_sec_process_mcs_data_CS_CORE() function.

For Debian 10 buster, these problems have been fixed in version
0.9.9-1+deb10u3.

We recommend that you upgrade your xrdp packages.

For the detailed security status of xrdp please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/xrdp

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



Severity
Package : xrdp
Version : 0.9.9-1+deb10u3
Debian Bug : 1025879

Related News