Skip to content

Commit a9d4130

Browse files
authored
Merge pull request #1624 from metalefty/v0.9-CVE-2020-4044
Release v0.9.13.1
2 parents 0a06831 + 9c508cd commit a9d4130

File tree

8 files changed

+615
-268
lines changed

8 files changed

+615
-268
lines changed

NEWS.md

+15-1
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,17 @@
1+
# Release notes for xrdp v0.9.13.1 (2020/06/30)
2+
3+
This is a security fix release that includes fixes for the following local buffer overflow vulnerability.
4+
5+
* [CVE-2022-4044: Local users can perform a buffer overflow attack against the xrdp-sesman service and then impersonate it](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4044)
6+
7+
This update is recommended for all xrdp users.
8+
9+
## Special thanks
10+
11+
Thanks to [Ashley Newson](https://github.com/ashleynewson) reporting the vulnerability and reviewing fix.
12+
13+
-----------------------
14+
115
# Release notes for xrdp v0.9.13 (2020/03/11)
216

317
This release is an intermediate bugfix release. The previous version v0.9.12 has some regressions on drive redirection.
@@ -111,7 +125,7 @@ Thank you for matt335672 contributing to lots of improvements in drive redirecti
111125

112126
-----------------------
113127

114-
## Release notes for xrdp v0.9.9 (2018/12/25)
128+
# Release notes for xrdp v0.9.9 (2018/12/25)
115129

116130
## Release cycle
117131
From the next release, release cycle will be changed from quarterly to every

README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
[![Gitter](https://badges.gitter.im/Join%20Chat.svg)](https://gitter.im/neutrinolabs/xrdp-questions)
33
![Apache-License](https://img.shields.io/badge/License-Apache%202.0-blue.svg)
44

5-
*Current Version:* 0.9.13
5+
*Current Version:* 0.9.13.1
66

77
# xrdp - an open source RDP server
88

configure.ac

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
# Process this file with autoconf to produce a configure script
22

33
AC_PREREQ(2.65)
4-
AC_INIT([xrdp], [0.9.13], [[email protected]])
4+
AC_INIT([xrdp], [0.9.13.1], [[email protected]])
55
AC_CONFIG_HEADERS(config_ac.h:config_ac-h.in)
66
AM_INIT_AUTOMAKE([1.7.2 foreign])
77
AC_CONFIG_MACRO_DIR([m4])

sesman/libscp/libscp_types.h

+4
Original file line numberDiff line numberDiff line change
@@ -59,6 +59,10 @@
5959

6060
#include "libscp_types_mng.h"
6161

62+
/* Max server incoming and outgoing message size, used to stop memory
63+
exhaustion attempts (CVE-2020-4044) */
64+
#define SCP_MAX_MESSAGE_SIZE 8192
65+
6266
struct SCP_CONNECTION
6367
{
6468
int in_sck;

0 commit comments

Comments
 (0)