Bug 32575 - xrdp new security issue CVE-2023-42822
Summary: xrdp new security issue CVE-2023-42822
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 9
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA9-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2023-11-27 17:29 CET by Nicolas Salguero
Modified: 2024-03-21 15:28 CET (History)
5 users (show)

See Also:
Source RPM: xrdp-0.9.23-1.mga9.src.rpm
CVE:
Status comment:


Attachments

Description Nicolas Salguero 2023-11-27 17:29:42 CET
SUSE has issued an advisory today (November 27):
https://lwn.net/Articles/952920/

Mageia 9 is also affected.

According to https://security-tracker.debian.org/tracker/CVE-2023-42822,
the fix is here: https://github.com/neutrinolabs/xrdp/commit/73acbe1f7957c65122b00de4d6f57a8d0d257c40
Nicolas Salguero 2023-11-27 17:30:15 CET

Source RPM: (none) => xrdp-0.9.23-1.mga10.src.rpm
Status comment: (none) => Patch available from upstream

Comment 1 Nicolas Salguero 2023-11-27 17:31:27 CET
Version 0.9.23.1 also contains the fix for that problem.
Comment 2 Lewis Smith 2023-11-27 21:32:02 CET
Careful with the trailing '1'!

 https://github.com/neutrinolabs/xrdp/releases
"xrdp v0.9.23.1 Latest
Release notes for xrdp v0.9.23.1 (2023/09/27)
This is a security fix release for CVE-2023-42822. This update is recommended for all xrdp users.
Security fixes
    CVE-2023-42822: Unchecked access to font glyph info"

So it looks like rather than messing about patching, update to the latest version fixes it.
Assigning globally, no one packager in evidence.

Status comment: Patch available from upstream => Patch available from upstream; fixed in v0.9.23.1
Source RPM: xrdp-0.9.23-1.mga10.src.rpm => xrdp-0.9.23-1.mga10.src.rpm, xrdp-0.9.23-1.mga9.src.rpm
Assignee: bugsquad => pkg-bugs

Comment 3 Nicolas Salguero 2023-11-30 13:43:11 CET
Suggested advisory:
========================

The updated packages fix a security vulnerability:

Access to the font glyphs in xrdp_painter.c is not bounds-checked. Since some of this data is controllable by the user, this can result in an out-of-bounds read within the xrdp executable. The vulnerability allows an out-of-bounds read within a potentially privileged process. On non-Debian platforms, xrdp tends to run as root. Potentially an out-of-bounds write can follow the out-of-bounds read. There is no denial-of-service impact, providing xrdp is running in forking mode. (CVE-2023-42822)

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42822
https://lwn.net/Articles/952920/
========================

Updated packages in core/updates_testing:
========================
xrdp-0.9.23.1-1.mga9
xrdp-devel-0.9.23.1-1.mga9

from SRPM:
xrdp-0.9.23.1-1.mga9.src.rpm

Version: Cauldron => 9
Source RPM: xrdp-0.9.23-1.mga10.src.rpm, xrdp-0.9.23-1.mga9.src.rpm => xrdp-0.9.23-1.mga9.src.rpm
Status: NEW => ASSIGNED
Assignee: pkg-bugs => qa-bugs
Status comment: Patch available from upstream; fixed in v0.9.23.1 => (none)

Comment 4 Marja Van Waes 2023-11-30 16:38:11 CET Comment hidden (obsolete)

Keywords: (none) => advisory
CC: (none) => marja11

Marja Van Waes 2023-11-30 16:45:24 CET

Keywords: advisory => (none)

Comment 5 Marja Van Waes 2023-11-30 16:52:19 CET
(In reply to Marja Van Waes from comment #4)
> Advisory from comment 3 added to SVN. Please remove the "advisory" keyword
> if it needs to be changed. It also helps when obsolete advisories are tagged
> as "obsolete"

Had to redo that one, but it is in SVN now.

Keywords: (none) => advisory

Comment 6 Brian Rockwell 2023-11-30 17:38:31 CET
mga9-x86, xfce

installed, turned off firewall, and started services.

I was able to connect using xfreerdp without any issues.

Working as designed.

Whiteboard: (none) => MGA9-64-OK
CC: (none) => brtians1

Comment 7 Thomas Andrews 2023-11-30 20:15:14 CET
Validating.

CC: (none) => andrewsfarm, sysadmin-bugs
Keywords: (none) => validated_update

Comment 8 Mageia Robot 2023-12-01 13:56:59 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2023-0334.html

Resolution: (none) => FIXED
Status: ASSIGNED => RESOLVED

Comment 9 David Winnie 2024-03-21 05:12:25 CET Comment hidden (spam)

CC: (none) => reyna1081us

Dave Hodgins 2024-03-21 15:28:23 CET

CC: reyna1081us => davidwhodgins


Note You need to log in before you can comment on or make changes to this bug.