Skip to content

Commit

Permalink
Merge pull request #2139 from metalefty/release
Browse files Browse the repository at this point in the history
Release v0.9.18.1
  • Loading branch information
metalefty authored Feb 7, 2022
2 parents cb1d034 + b160f84 commit 7e61945
Show file tree
Hide file tree
Showing 4 changed files with 21 additions and 5 deletions.
14 changes: 14 additions & 0 deletions NEWS.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,17 @@
# Release notes for xrdp v0.9.18.1 (2022/02/08)

This is a security fix release that includes fixes for the following privilege escalation vulnerability.

* [CVE-2022-23613: Privilege escalation on xrdp-sesman](https://www.cve.org/CVERecord?id=CVE-2022-23613)

Users who uses xrdp v0.9.17 or v0.9.18 are recommended to update to this version.

## Special thanks

Thanks to [Gilad Kleinman](https://github.com/giladkl) reporting the vulnerability and reviewing fix.

-----------------------

# Release notes for xrdp v0.9.18 (2022/01/10)

## General announcements
Expand Down
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
[![Gitter](https://badges.gitter.im/Join%20Chat.svg)](https://gitter.im/neutrinolabs/xrdp-questions)
![Apache-License](https://img.shields.io/badge/License-Apache%202.0-blue.svg)

*Current Version:* 0.9.17
*Current Version:* 0.9.18.1

# xrdp - an open source RDP server

Expand Down
2 changes: 1 addition & 1 deletion configure.ac
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
# Process this file with autoconf to produce a configure script

AC_PREREQ(2.65)
AC_INIT([xrdp], [0.9.18], [[email protected]])
AC_INIT([xrdp], [0.9.18.1], [[email protected]])
AC_CONFIG_HEADERS(config_ac.h:config_ac-h.in)
AM_INIT_AUTOMAKE([1.7.2 foreign])
AC_CONFIG_MACRO_DIR([m4])
Expand Down
8 changes: 5 additions & 3 deletions sesman/sesman.c
Original file line number Diff line number Diff line change
Expand Up @@ -276,16 +276,17 @@ sesman_close_all(void)
static int
sesman_data_in(struct trans *self)
{
#define HEADER_SIZE 8
int version;
int size;

if (self->extra_flags == 0)
{
in_uint32_be(self->in_s, version);
in_uint32_be(self->in_s, size);
if (size > self->in_s->size)
if (size < HEADER_SIZE || size > self->in_s->size)
{
LOG(LOG_LEVEL_ERROR, "sesman_data_in: bad message size");
LOG(LOG_LEVEL_ERROR, "sesman_data_in: bad message size %d", size);
return 1;
}
self->header_size = size;
Expand All @@ -302,11 +303,12 @@ sesman_data_in(struct trans *self)
return 1;
}
/* reset for next message */
self->header_size = 8;
self->header_size = HEADER_SIZE;
self->extra_flags = 0;
init_stream(self->in_s, 0); /* Reset input stream pointers */
}
return 0;
#undef HEADER_SIZE
}

/******************************************************************************/
Expand Down

0 comments on commit 7e61945

Please sign in to comment.