Mageia 2023-0276: xrdp security update
Summary
In versions prior to 0.9.23 improper handling of session establishment
errors allows bypassing OS-level session restrictions. The
`auth_start_session` function can return non-zero (1) value on, e.g.,
PAM error which may result in in session restrictions such as max
concurrent sessions per user by PAM (ex ./etc/security/limits.conf) to
be bypassed. (CVE-2023-40184)
References
- https://bugs.mageia.org/show_bug.cgi?id=32276
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40184
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SOT237TIHTHPX5YNIWLVNINOEYC7WMG2/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40184
Resolution
MGASA-2023-0276 - Updated xrdp packages fix security vulnerability
SRPMS
- 8/core/xrdp-0.9.23-1.mga8
- 9/core/xrdp-0.9.23-1.mga9