Nixpkgs security tracker

Login with GitHub

Details of issue NIXPKGS-2026-1176

NIXPKGS-2026-1176
published on
updated 1 week, 3 days ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored package pulseaudio-module-xrdp
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
xrdp: Heap buffer overflow in xrdp_sec_process_logon_info() via incorrect g_strncat length calculation

xrdp is an open source RDP server. Versions through 0.10.5 contain a heap-based buffer overflow vulnerability in its logon processing. In environments where domain_user_separator is configured in xrdp.ini, an unauthenticated remote attacker can send a crafted, excessively long username and domain name to overflow the internal buffer. This can corrupt adjacent memory regions, potentially leading to a Denial of Service (DoS) or unexpected behavior. The domain_name_separator directive is commented out by default, systems are not affected by this vulnerability unless it is intentionally configured. This issue has been fixed in version 0.10.6.

Affected products

xrdp
  • ==< 0.10.6

Matching in nixpkgs

Ignored packages (1)

Package maintainers