CVE-2026-32107

NameCVE-2026-32107
Descriptionxrdp is an open source RDP server. In versions through 0.10.5, the session execution component did not properly handle an error during the privilege drop process. This improper privilege management could allow an authenticated local attacker to escalate privileges to root and execute arbitrary code on the system. An additional exploit would be needed to facilitate this. This issue has been fixed in version 0.10.6.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
xrdp (PTS)bullseye0.9.21.1-1~deb11u1vulnerable
bullseye (security)0.9.21.1-1~deb11u3vulnerable
bookworm0.9.21.1-1+deb12u1vulnerable
bookworm (security)0.9.21.1-1+deb12u2vulnerable
trixie (security), trixie0.10.1-3.1+deb13u1vulnerable
forky, sid0.10.5-5vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
xrdpsource(unstable)(unfixed)

Notes

https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-p5m6-7m43-pjv9

Search for package or bug name: Reporting problems