MGASA-2023-0276

Source
https://advisories.mageia.org/MGASA-2023-0276.html
Import Source
https://advisories.mageia.org/MGASA-2023-0276.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2023-0276
Related
Published
2023-09-30T19:15:40Z
Modified
2023-09-30T17:33:37Z
Summary
Updated xrdp packages fix security vulnerability
Details

In versions prior to 0.9.23 improper handling of session establishment errors allows bypassing OS-level session restrictions. The auth_start_session function can return non-zero (1) value on, e.g., PAM error which may result in in session restrictions such as max concurrent sessions per user by PAM (ex ./etc/security/limits.conf) to be bypassed. (CVE-2023-40184)

References
Credits

Affected packages

Mageia:8 / xrdp

Package

Name
xrdp
Purl
pkg:rpm/mageia/xrdp?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.23-1.mga8

Ecosystem specific

{
    "section": "core"
}

Mageia:9 / xrdp

Package

Name
xrdp
Purl
pkg:rpm/mageia/xrdp?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.23-1.mga9

Ecosystem specific

{
    "section": "core"
}