Bugzilla – Bug 1215803
VUL-0: CVE-2023-42822: xrdp: unchecked access to font glyph info
Last modified: 2023-12-14 20:30:17 UTC
xrdp is an open source remote desktop protocol server. Access to the font glyphs in xrdp_painter.c is not bounds-checked . Since some of this data is controllable by the user, this can result in an out-of-bounds read within the xrdp executable. The vulnerability allows an out-of-bounds read within a potentially privileged process. On non-Debian platforms, xrdp tends to run as root. Potentially an out-of-bounds write can follow the out-of-bounds read. There is no denial-of-service impact, providing xrdp is running in forking mode. This issue has been addressed in release 0.9.23.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42822
SUSE-SU-2023:4577-1: An update that solves one vulnerability can now be installed. Category: security (moderate) Bug References: 1215803 CVE References: CVE-2023-42822 Sources used: openSUSE Leap 15.4 (src): xrdp-0.9.13.1-150200.4.27.1 openSUSE Leap 15.5 (src): xrdp-0.9.13.1-150200.4.27.1 Basesystem Module 15-SP4 (src): xrdp-0.9.13.1-150200.4.27.1 Basesystem Module 15-SP5 (src): xrdp-0.9.13.1-150200.4.27.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4873-1: An update that solves two vulnerabilities and has one security fix can now be installed. Category: security (moderate) Bug References: 1214805, 1215803, 1217759 CVE References: CVE-2023-40184, CVE-2023-42822 Sources used: SUSE Linux Enterprise High Performance Computing 12 SP5 (src): xrdp-0.9.10-3.16.1 SUSE Linux Enterprise Server 12 SP5 (src): xrdp-0.9.10-3.16.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): xrdp-0.9.10-3.16.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.