ALT-PU-2017-2384-1
Package xorg-server updated to version 1.18.4-alt1.M80P.5 for branch p8 in task 190283.
Closed vulnerabilities
Modified: 2025-08-29
CVE-2017-13721
In X.Org Server (aka xserver and xorg-server) before 1.19.4, an attacker authenticated to an X server with the X shared memory extension enabled can cause aborts of the X server or replace shared memory segments of other X clients in the same session.
- http://www.debian.org/security/2017/dsa-4000
- http://www.openwall.com/lists/oss-security/2017/10/04/10
- http://www.securityfocus.com/bid/101238
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=b95f25af141d33a65f6f821ea9c003f66a01e1f1
- https://lists.x.org/archives/xorg-announce/2017-October/002808.html
- https://security.gentoo.org/glsa/201710-30
- http://www.debian.org/security/2017/dsa-4000
- http://www.openwall.com/lists/oss-security/2017/10/04/10
- http://www.securityfocus.com/bid/101238
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=b95f25af141d33a65f6f821ea9c003f66a01e1f1
- https://lists.x.org/archives/xorg-announce/2017-October/002808.html
- https://security.gentoo.org/glsa/201710-30
Modified: 2025-08-29
CVE-2017-13723
In X.Org Server (aka xserver and xorg-server) before 1.19.4, a local attacker authenticated to the X server could overflow a global buffer, causing crashes of the X server or potentially other problems by injecting large or malformed XKB related atoms and accessing them via xkbcomp.
- http://www.debian.org/security/2017/dsa-4000
- http://www.openwall.com/lists/oss-security/2017/10/04/10
- http://www.securityfocus.com/bid/101253
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=94f11ca5cf011ef123bd222cabeaef6f424d76ac
- https://lists.debian.org/debian-lts-announce/2017/11/msg00032.html
- https://lists.x.org/archives/xorg-announce/2017-October/002808.html
- https://security.gentoo.org/glsa/201710-30
- http://www.debian.org/security/2017/dsa-4000
- http://www.openwall.com/lists/oss-security/2017/10/04/10
- http://www.securityfocus.com/bid/101253
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=94f11ca5cf011ef123bd222cabeaef6f424d76ac
- https://lists.debian.org/debian-lts-announce/2017/11/msg00032.html
- https://lists.x.org/archives/xorg-announce/2017-October/002808.html
- https://security.gentoo.org/glsa/201710-30
Modified: 2025-08-29
CVE-2017-2624
It was found that xorg-x11-server before 1.19.0 including uses memcmp() to check the received MIT cookie against a series of valid cookies. If the cookie is correct, it is allowed to attach to the Xorg session. Since most memcmp() implementations return after an invalid byte is seen, this causes a time difference between a valid and invalid byte, which could allow an efficient brute force attack.
- http://www.securityfocus.com/bid/96480
- http://www.securitytracker.com/id/1037919
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2624
- https://gitlab.freedesktop.org/xorg/xserver/commit/d7ac755f0b618eb1259d93c8a16ec6e39a18627c
- https://lists.debian.org/debian-lts-announce/2017/11/msg00032.html
- https://security.gentoo.org/glsa/201704-03
- https://security.gentoo.org/glsa/201710-30
- https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/
- http://www.securityfocus.com/bid/96480
- http://www.securitytracker.com/id/1037919
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2624
- https://gitlab.freedesktop.org/xorg/xserver/commit/d7ac755f0b618eb1259d93c8a16ec6e39a18627c
- https://lists.debian.org/debian-lts-announce/2017/11/msg00032.html
- https://security.gentoo.org/glsa/201704-03
- https://security.gentoo.org/glsa/201710-30
- https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/