From 5ad185879e6f6b12c076361e3da7c685caf697c98b1b340f260cccd6fe890224 Mon Sep 17 00:00:00 2001 From: Robert Frohl Date: Mon, 2 Feb 2026 15:17:34 +0100 Subject: [PATCH] Update submodules from pool/xrdp#1 and create patchinfo.20260202141654318677.93181000773252/_patchinfo --- .../_patchinfo | 15 +++++++++++++++ xrdp | 2 +- 2 files changed, 16 insertions(+), 1 deletion(-) create mode 100644 patchinfo.20260202141654318677.93181000773252/_patchinfo diff --git a/patchinfo.20260202141654318677.93181000773252/_patchinfo b/patchinfo.20260202141654318677.93181000773252/_patchinfo new file mode 100644 index 0000000..b6e46e6 --- /dev/null +++ b/patchinfo.20260202141654318677.93181000773252/_patchinfo @@ -0,0 +1,15 @@ + + VUL-0: CVE-2025-68670: xrdp: improper bounds check when processing user domain information during the connection sequence can lead to a stack buffer overflow + VUL-0: CVE-2025-68670: xrdp: improper bounds check when processing user domain information during the connection sequence can lead to a stack buffer overflow + xiaoguang_wang + important + security + Security update for xrdp + This update for xrdp fixes the following issues: + +Changes in xrdp: + +- CVE-2025-68670: Fixed a potential overflow (bsc#1257362). + + xrdp + diff --git a/xrdp b/xrdp index 2dff7cb..c8468cd 160000 --- a/xrdp +++ b/xrdp @@ -1 +1 @@ -Subproject commit 2dff7cb83f07de584b97a1a20325e67545525cc6e433715ce854cb492b67cfe4 +Subproject commit c8468cdc5b916ea8213c717b71a09380be6a1cd9515d6214981b7302a5e1893e -- 2.51.1