Package: release.debian.org
Severity: normal
User: release.debian....@packages.debian.org
Usertags: unblock

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Please unblock package xrdp

The new upload fixes a security issue, CVE-2017-6967.

debdiff attached.

unblock xrdp/0.9.1-8

- -- System Information:
Debian Release: 9.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable')
Architecture: amd64
 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.9.0-2-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)

-----BEGIN PGP SIGNATURE-----
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=XzFs
-----END PGP SIGNATURE-----
diff -Nru xrdp-0.9.1/debian/changelog xrdp-0.9.1/debian/changelog
--- xrdp-0.9.1/debian/changelog 2017-02-18 16:46:17.000000000 +0100
+++ xrdp-0.9.1/debian/changelog 2017-04-24 20:14:36.000000000 +0200
@@ -1,3 +1,9 @@
+xrdp (0.9.1-8) unstable; urgency=medium
+
+  * Fix CVE-2017-6967. (Closes: #858143, #855536)
+
+ -- Dominik George <n...@naturalnet.de>  Mon, 24 Apr 2017 20:14:36 +0200
+
 xrdp (0.9.1-7) unstable; urgency=medium
 
   * Fix RFX with large tile sets, e.g. full HD displays. (Closes: #855387)
diff -Nru xrdp-0.9.1/debian/patches/cve-2017-6967.diff 
xrdp-0.9.1/debian/patches/cve-2017-6967.diff
--- xrdp-0.9.1/debian/patches/cve-2017-6967.diff        1970-01-01 
01:00:00.000000000 +0100
+++ xrdp-0.9.1/debian/patches/cve-2017-6967.diff        2017-04-24 
20:14:36.000000000 +0200
@@ -0,0 +1,91 @@
+From: Jay Sorg <jay.s...@gmail.com>
+Date: Mon, 20 Mar 2017 18:59:44 -0700
+Subject: [PATCH] sesman: move auth/pam calls to main process
+Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858143
+Origin: 
https://github.com/neutrinolabs/xrdp/commit/4b8a33e087ee9cf5556b40b717cd7e8ff243b3c3
+
+--- a/sesman/scp_v0.c
++++ b/sesman/scp_v0.c
+@@ -36,6 +36,7 @@ scp_v0_process(struct SCP_CONNECTION *c,
+     tbus data;
+     struct session_item *s_item;
+     int errorcode = 0;
++    int do_auth_end = 1;
+ 
+     data = auth_userpass(s->username, s->password, &errorcode);
+ 
+@@ -131,6 +132,9 @@ scp_v0_process(struct SCP_CONNECTION *c,
+                     log_message(LOG_LEVEL_INFO, "starting Xorg session...");
+                     display = session_start(data, SESMAN_SESSION_TYPE_XORG, 
s);
+                 }
++                /* if the session started up ok, auth_end will be called on
++                   sig child */
++                do_auth_end = display == 0;
+             }
+             else
+             {
+@@ -151,5 +155,8 @@ scp_v0_process(struct SCP_CONNECTION *c,
+     {
+         scp_v0s_deny_connection(c);
+     }
+-    auth_end(data);
++    if (do_auth_end)
++    {
++        auth_end(data);
++    }
+ }
+--- a/sesman/scp_v1.c
++++ b/sesman/scp_v1.c
+@@ -38,7 +38,7 @@ void DEFAULT_CC
+ scp_v1_process(struct SCP_CONNECTION *c, struct SCP_SESSION *s)
+ {
+     long data;
+-    int display;
++    int display = 0;
+     int retries;
+     int current_try;
+     enum SCP_SERVER_STATES_E e;
+@@ -46,6 +46,7 @@ scp_v1_process(struct SCP_CONNECTION *c,
+     struct session_item *sitem;
+     int scount;
+     SCP_SID sid;
++    int do_auth_end = 1;
+ 
+     retries = g_cfg->sec.login_retry;
+     current_try = retries;
+@@ -124,14 +125,21 @@ scp_v1_process(struct SCP_CONNECTION *c,
+             log_message(LOG_LEVEL_INFO, "starting Xvnc session...");
+             display = session_start(data, SESMAN_SESSION_TYPE_XVNC, s);
+         }
+-        else
++        else if (SCP_SESSION_TYPE_XRDP == s->type)
+         {
+             log_message(LOG_LEVEL_INFO, "starting X11rdp session...");
+             display = session_start(data, SESMAN_SESSION_TYPE_XRDP, s);
+         }
++        else if (SCP_SESSION_TYPE_XORG == s->type)
++        {
++            log_message(LOG_LEVEL_INFO, "starting Xorg session...");
++            display = session_start(data, SESMAN_SESSION_TYPE_XORG, s);
++        }
++        /* if the session started up ok, auth_end will be called on
++           sig child */
++        do_auth_end = display == 0;
+ 
+         e = scp_v1s_connect_new_session(c, display);
+-
+         switch (e)
+         {
+             case SCP_SERVER_STATE_OK:
+@@ -197,7 +205,10 @@ scp_v1_process(struct SCP_CONNECTION *c,
+     }
+ 
+     /* cleanup */
+-    auth_end(data);
++    if (do_auth_end)
++    {
++        auth_end(data);
++    }
+     g_free(slist);
+ }
+ 
diff -Nru xrdp-0.9.1/debian/patches/series xrdp-0.9.1/debian/patches/series
--- xrdp-0.9.1/debian/patches/series    2017-02-17 13:08:38.000000000 +0100
+++ xrdp-0.9.1/debian/patches/series    2017-04-24 20:14:36.000000000 +0200
@@ -9,3 +9,4 @@
 lfs.diff
 kb_jp.diff
 highres.diff
+cve-2017-6967.diff

Reply via email to