ALT-PU-2017-2384-1
Package xorg-server updated to version 1.18.4-alt1.M80P.5 for branch p8 in task 190283.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-13721
In X.Org Server (aka xserver and xorg-server) before 1.19.4, an attacker authenticated to an X server with the X shared memory extension enabled can cause aborts of the X server or replace shared memory segments of other X clients in the same session.
- DSA-4000
- DSA-4000
- [oss-security] 20171004 Fwd: X server fixes for CVE-2017-13721 & CVE-2017-13723
- [oss-security] 20171004 Fwd: X server fixes for CVE-2017-13721 & CVE-2017-13723
- 101238
- 101238
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=b95f25af141d33a65f6f821ea9c003f66a01e1f1
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=b95f25af141d33a65f6f821ea9c003f66a01e1f1
- [xorg-announce] 20171004 [ANNOUNCE] xorg-server 1.19.4
- [xorg-announce] 20171004 [ANNOUNCE] xorg-server 1.19.4
- GLSA-201710-30
- GLSA-201710-30
Modified: 2024-11-21
CVE-2017-13723
In X.Org Server (aka xserver and xorg-server) before 1.19.4, a local attacker authenticated to the X server could overflow a global buffer, causing crashes of the X server or potentially other problems by injecting large or malformed XKB related atoms and accessing them via xkbcomp.
- DSA-4000
- DSA-4000
- [oss-security] 20171004 Fwd: X server fixes for CVE-2017-13721 & CVE-2017-13723
- [oss-security] 20171004 Fwd: X server fixes for CVE-2017-13721 & CVE-2017-13723
- 101253
- 101253
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=94f11ca5cf011ef123bd222cabeaef6f424d76ac
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=94f11ca5cf011ef123bd222cabeaef6f424d76ac
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- [xorg-announce] 20171004 [ANNOUNCE] xorg-server 1.19.4
- [xorg-announce] 20171004 [ANNOUNCE] xorg-server 1.19.4
- GLSA-201710-30
- GLSA-201710-30
Modified: 2024-11-21
CVE-2017-2624
It was found that xorg-x11-server before 1.19.0 including uses memcmp() to check the received MIT cookie against a series of valid cookies. If the cookie is correct, it is allowed to attach to the Xorg session. Since most memcmp() implementations return after an invalid byte is seen, this causes a time difference between a valid and invalid byte, which could allow an efficient brute force attack.
- 96480
- 96480
- 1037919
- 1037919
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2624
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2624
- https://gitlab.freedesktop.org/xorg/xserver/commit/d7ac755f0b618eb1259d93c8a16ec6e39a18627c
- https://gitlab.freedesktop.org/xorg/xserver/commit/d7ac755f0b618eb1259d93c8a16ec6e39a18627c
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- GLSA-201704-03
- GLSA-201704-03
- GLSA-201710-30
- GLSA-201710-30
- https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/
- https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/