Bug#882463: marked as done (xrdp: CVE-2017-16927: Buffer-overflow in scp_v0s_accept function in session manager)

2018-02-23 Thread Debian Bug Tracking System
Your message dated Fri, 23 Feb 2018 12:47:10 +
with message-id 
and subject line Bug#882463: fixed in xrdp 0.9.1-9+deb9u2
has caused the Debian Bug report #882463,
regarding xrdp: CVE-2017-16927: Buffer-overflow in scp_v0s_accept function in 
session manager
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
882463: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882463
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: xrdp
Version: 0.9.1-1
Severity: grave
Tags: security upstream
Forwarded: https://github.com/neutrinolabs/xrdp/pull/958

Hi,

the following vulnerability was published for xrdp.

CVE-2017-16927[0]:
| The scp_v0s_accept function in sesman/libscp/libscp_v0.c in the session
| manager in xrdp through 0.9.4 uses an untrusted integer as a write
| length, which allows local users to cause a denial of service (buffer
| overflow and application crash) or possibly have unspecified other
| impact via a crafted input stream.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-16927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16927
[1] https://groups.google.com/forum/#!topic/xrdp-devel/PmVfMuy_xBA
[2] https://github.com/neutrinolabs/xrdp/pull/958

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: xrdp
Source-Version: 0.9.1-9+deb9u2

We believe that the bug you reported is fixed in the latest version of
xrdp, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 882...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Dominik George  (supplier of updated xrdp package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Fri, 15 Dec 2017 19:28:28 +0100
Source: xrdp
Binary: xrdp xorgxrdp
Architecture: source amd64
Version: 0.9.1-9+deb9u2
Distribution: stretch
Urgency: medium
Maintainer: Debian Remote Maintainers 
Changed-By: Dominik George 
Description:
 xorgxrdp   - Remote Desktop Protocol (RDP) modules for X.org
 xrdp   - Remote Desktop Protocol (RDP) server
Closes: 882463 884453
Changes:
 xrdp (0.9.1-9+deb9u2) stretch; urgency=medium
 .
   * Fix CVE-2017-16927. (Closes: #882463)
   * Fix high CPU load on ssl_tls_accept. (Closes: #884453)
Checksums-Sha1:
 de2c8a3e38b054a98f99a159f4629ecc7058ae0d 2667 xrdp_0.9.1-9+deb9u2.dsc
 dc1bb7b6ce2fb7a46eb90f5f18a7a4b46acbbad5 29464 
xrdp_0.9.1-9+deb9u2.debian.tar.xz
 12ed5c7105e61c93e27d9e9918de5af6fe6762a8 898410 
xorgxrdp-dbgsym_0.9.1-9+deb9u2_amd64.deb
 86641f6e164b48d2208a3a30a5ce07c3abfad1fc 80536 
xorgxrdp_0.9.1-9+deb9u2_amd64.deb
 fae0ce86e009764605eb5fc7bd2f56c5c0b92cec 729496 
xrdp-dbgsym_0.9.1-9+deb9u2_amd64.deb
 166e83a63ee2015428d882a1d22e6eefa54c5f5d 10628 
xrdp_0.9.1-9+deb9u2_amd64.buildinfo
 f2e861769ec1697ee341ab38be6e8347b9a93b35 438424 xrdp_0.9.1-9+deb9u2_amd64.deb
Checksums-Sha256:
 0d0876631b77fa2574a2d5650313e7d006d428d4ce7542ba88a2e165d22b6b71 2667 
xrdp_0.9.1-9+deb9u2.dsc
 c504d134b279358121b00228cdb0a76aae410e900cd67038564f44d102900d32 29464 
xrdp_0.9.1-9+deb9u2.debian.tar.xz
 38a3d21c16e6db71148e7d15a48effb210120f940002ed4fa93054330133dd97 898410 
xorgxrdp-dbgsym_0.9.1-9+deb9u2_amd64.deb
 924cf0d0146e561edf4ab3697f8a3ea3fd50e59c644233414ea5e2064b000f69 80536 
xorgxrdp_0.9.1-9+deb9u2_amd64.deb
 bbdeb747c49db82b4069bac3d1c1c224579ac5e33efffcf33e3cd68257e0e02c 729496 
xrdp-dbgsym_0.9.1-9+deb9u2_amd64.deb
 63723f753721751aeed5b94b4cebed8e34a226ec172dfa8da548ccdead12e8e7 10628 
xrdp_0.9.1-9+deb9u2_amd64.buildinfo
 83dc60644dd6f30d160b7e50d904c5ebfa3e632d83600ab5251cbf4e6da5dfab 438424 
xrdp_0.9.1-9+deb9u2_amd64.deb
Files:
 1127b6c11ce7c68b0a8421477629198d 2667 net optional xrdp_0.9.1-9+deb9u2.dsc
 5f83fc3f40a5f12656586b4ccac79707 29464 net optional 
xrdp_0.9.1-9+deb9u2.debian.tar.xz
 c9e974f7707f10ac5f7c93621b9eef7f 898410 debug extra 
xorgxrdp-dbgsym_0.9.1-9+deb9u2_amd64.deb
 2020d7fc2525a30c63bd5d8ef297928c 80536 net optional 
xorgxrdp_0.9.1-9+deb9u2_amd64.deb
 e5eca75ceb3cba61c5

Bug#882463: marked as done (xrdp: CVE-2017-16927: Buffer-overflow in scp_v0s_accept function in session manager)

2017-12-14 Thread Debian Bug Tracking System
Your message dated Fri, 15 Dec 2017 01:49:23 +
with message-id 
and subject line Bug#882463: fixed in xrdp 0.9.4-2
has caused the Debian Bug report #882463,
regarding xrdp: CVE-2017-16927: Buffer-overflow in scp_v0s_accept function in 
session manager
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
882463: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882463
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: xrdp
Version: 0.9.1-1
Severity: grave
Tags: security upstream
Forwarded: https://github.com/neutrinolabs/xrdp/pull/958

Hi,

the following vulnerability was published for xrdp.

CVE-2017-16927[0]:
| The scp_v0s_accept function in sesman/libscp/libscp_v0.c in the session
| manager in xrdp through 0.9.4 uses an untrusted integer as a write
| length, which allows local users to cause a denial of service (buffer
| overflow and application crash) or possibly have unspecified other
| impact via a crafted input stream.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-16927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16927
[1] https://groups.google.com/forum/#!topic/xrdp-devel/PmVfMuy_xBA
[2] https://github.com/neutrinolabs/xrdp/pull/958

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: xrdp
Source-Version: 0.9.4-2

We believe that the bug you reported is fixed in the latest version of
xrdp, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 882...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Dominik George  (supplier of updated xrdp package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Fri, 15 Dec 2017 02:10:18 +0100
Source: xrdp
Binary: xrdp xorgxrdp
Architecture: source amd64
Version: 0.9.4-2
Distribution: unstable
Urgency: high
Maintainer: Debian Remote Maintainers 
Changed-By: Dominik George 
Description:
 xorgxrdp   - Remote Desktop Protocol (RDP) modules for X.org
 xrdp   - Remote Desktop Protocol (RDP) server
Closes: 882463
Changes:
 xrdp (0.9.4-2) unstable; urgency=high
 .
   [ Dominik George ]
   * Fix typo in previous changelog.
   * Fix CVE-2017-16927. (Closes: #882463)
   * Bump Standards-Version.
 + No changes needed.
 .
   [ Thorsten Glaser ]
   * Place missing log_end_msg in init script.
   * Run libpainter/bootstrap as well.
   * Re-enable SIMD on any-i386.
   * Cherry-pick missing parts from experimental branch.
   * Fix another typo in previous changelog.
Checksums-Sha1:
 b1cde0d1c99637a015bdfa3c50b9daa8c3f22e05 2668 xrdp_0.9.4-2.dsc
 7b16f45d926cab36ce369dbf953ae3b29533ea60 24692 xrdp_0.9.4-2.debian.tar.xz
 a1bf0e0e3f72234142cb77e482e1e10d69ce225b 907692 
xorgxrdp-dbgsym_0.9.4-2_amd64.deb
 a54bbfc36a76eb711b9fabf507f82fad2981c694 83748 xorgxrdp_0.9.4-2_amd64.deb
 f6cac895b9efbf3507dbb08029503694d33bd390 689996 xrdp-dbgsym_0.9.4-2_amd64.deb
 febe0a93bc08b9e59fed91296c8b783609e11068 10562 xrdp_0.9.4-2_amd64.buildinfo
 e6e08824b2cd25dd4c23130a2d8842177b1d0cfe 423532 xrdp_0.9.4-2_amd64.deb
Checksums-Sha256:
 84cbe65db64b63a829baf96a9d138bb3c4ce8e3464a20304e67993bc3000c1e1 2668 
xrdp_0.9.4-2.dsc
 af5bf78ac6fce04db69c9d59eb079f1c71877dc93dc727e672c73132158725fb 24692 
xrdp_0.9.4-2.debian.tar.xz
 e8792d001062b3f96eafc8182e82139c35d18496a2fa3d1babb1fdfa262b0a69 907692 
xorgxrdp-dbgsym_0.9.4-2_amd64.deb
 dd72b1736275148a308e18631d4ea4d80c0c8ed1a9937c4447198e97468122ac 83748 
xorgxrdp_0.9.4-2_amd64.deb
 460cbc5ec1c333b0e6d6f0adf57c7dfc7729b5da0f2864faebd4920d845d09eb 689996 
xrdp-dbgsym_0.9.4-2_amd64.deb
 7a9a9d5488c44e31ea44d4324e8f5f3b403b67514205b727424192db5277e793 10562 
xrdp_0.9.4-2_amd64.buildinfo
 20ad910e145adc7969b08ac4a84e7f3c4a98c37b0421782e907c15d6c19a3f56 423532 
xrdp_0.9.4-2_amd64.deb
Files:
 fba6ff6b7ef2456ebb4ad3446711574f 2668 net optional xrdp_0.9.4-2.dsc
 4823776abc8e9a3eb1691efbd8b46b77 24692 net optional xrdp_0.9.4-2.debian.tar.xz
 8488f6f19fb7db59b13f4aaa9c81dee2 907692 debug optional