ALT-PU-2017-2438-1
Package xorg-server updated to version 1.19.5-alt1 for branch sisyphus in task 190874.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-12176
xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
- https://bugzilla.redhat.com/show_bug.cgi?id=1509214
- https://bugzilla.redhat.com/show_bug.cgi?id=1509214
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- GLSA-201711-05
- GLSA-201711-05
- DSA-4000
- DSA-4000
Modified: 2024-11-21
CVE-2017-12177
xorg-x11-server before 1.19.5 was vulnerable to integer overflow in ProcDbeGetVisualInfo function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
- https://bugzilla.redhat.com/show_bug.cgi?id=1509218
- https://bugzilla.redhat.com/show_bug.cgi?id=1509218
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=4ca68b878e851e2136c234f40a25008297d8d831
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=4ca68b878e851e2136c234f40a25008297d8d831
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- GLSA-201711-05
- GLSA-201711-05
- DSA-4000
- DSA-4000
Modified: 2024-11-21
CVE-2017-12178
xorg-x11-server before 1.19.5 had wrong extra length check in ProcXIChangeHierarchy function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
- https://bugzilla.redhat.com/show_bug.cgi?id=1509219
- https://bugzilla.redhat.com/show_bug.cgi?id=1509219
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=859b08d523307eebde7724fd1a0789c44813e821
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=859b08d523307eebde7724fd1a0789c44813e821
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- GLSA-201711-05
- GLSA-201711-05
- DSA-4000
- DSA-4000
Modified: 2024-11-21
CVE-2017-12179
xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
- https://bugzilla.redhat.com/show_bug.cgi?id=1509220
- https://bugzilla.redhat.com/show_bug.cgi?id=1509220
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8
- GLSA-201711-05
- GLSA-201711-05
- DSA-4000
- DSA-4000
Modified: 2024-11-21
CVE-2017-12180
xorg-x11-server before 1.19.5 was missing length validation in XFree86 VidModeExtension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
- https://bugzilla.redhat.com/show_bug.cgi?id=1509221
- https://bugzilla.redhat.com/show_bug.cgi?id=1509221
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=1b1d4c04695dced2463404174b50b3581dbd857b
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=1b1d4c04695dced2463404174b50b3581dbd857b
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- GLSA-201711-05
- GLSA-201711-05
- DSA-4000
- DSA-4000
Modified: 2024-11-21
CVE-2017-12181
xorg-x11-server before 1.19.5 was missing length validation in XFree86 DGA extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
- https://bugzilla.redhat.com/show_bug.cgi?id=1509222
- https://bugzilla.redhat.com/show_bug.cgi?id=1509222
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=1b1d4c04695dced2463404174b50b3581dbd857b
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=1b1d4c04695dced2463404174b50b3581dbd857b
- GLSA-201711-05
- GLSA-201711-05
- DSA-4000
- DSA-4000
Modified: 2024-11-21
CVE-2017-12182
xorg-x11-server before 1.19.5 was missing length validation in XFree86 DRI extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
- https://bugzilla.redhat.com/show_bug.cgi?id=1509223
- https://bugzilla.redhat.com/show_bug.cgi?id=1509223
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=1b1d4c04695dced2463404174b50b3581dbd857b
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=1b1d4c04695dced2463404174b50b3581dbd857b
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- GLSA-201711-05
- GLSA-201711-05
- DSA-4000
- DSA-4000
Modified: 2024-11-21
CVE-2017-12183
xorg-x11-server before 1.19.5 was missing length validation in XFIXES extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
- https://bugzilla.redhat.com/show_bug.cgi?id=1509224
- https://bugzilla.redhat.com/show_bug.cgi?id=1509224
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=55caa8b08c84af2b50fbc936cf334a5a93dd7db5
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=55caa8b08c84af2b50fbc936cf334a5a93dd7db5
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- GLSA-201711-05
- GLSA-201711-05
- DSA-4000
- DSA-4000
Modified: 2024-11-21
CVE-2017-12184
xorg-x11-server before 1.19.5 was missing length validation in XINERAMA extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
- https://bugzilla.redhat.com/show_bug.cgi?id=1509225
- https://bugzilla.redhat.com/show_bug.cgi?id=1509225
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=cad5a1050b7184d828aef9c1dd151c3ab649d37e
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=cad5a1050b7184d828aef9c1dd151c3ab649d37e
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- DSA-4000
- DSA-4000
Modified: 2024-11-21
CVE-2017-12185
xorg-x11-server before 1.19.5 was missing length validation in MIT-SCREEN-SAVER extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
- https://bugzilla.redhat.com/show_bug.cgi?id=1509215
- https://bugzilla.redhat.com/show_bug.cgi?id=1509215
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=cad5a1050b7184d828aef9c1dd151c3ab649d37e
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=cad5a1050b7184d828aef9c1dd151c3ab649d37e
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- DSA-4000
- DSA-4000
Modified: 2024-11-21
CVE-2017-12186
xorg-x11-server before 1.19.5 was missing length validation in X-Resource extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
- https://bugzilla.redhat.com/show_bug.cgi?id=1509216
- https://bugzilla.redhat.com/show_bug.cgi?id=1509216
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=cad5a1050b7184d828aef9c1dd151c3ab649d37e
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=cad5a1050b7184d828aef9c1dd151c3ab649d37e
- DSA-4000
- DSA-4000
Modified: 2024-11-21
CVE-2017-12187
xorg-x11-server before 1.19.5 was missing length validation in RENDER extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
- https://bugzilla.redhat.com/show_bug.cgi?id=1509217
- https://bugzilla.redhat.com/show_bug.cgi?id=1509217
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=cad5a1050b7184d828aef9c1dd151c3ab649d37e
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=cad5a1050b7184d828aef9c1dd151c3ab649d37e
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- DSA-4000
- DSA-4000
Modified: 2024-11-21
CVE-2017-2624
It was found that xorg-x11-server before 1.19.0 including uses memcmp() to check the received MIT cookie against a series of valid cookies. If the cookie is correct, it is allowed to attach to the Xorg session. Since most memcmp() implementations return after an invalid byte is seen, this causes a time difference between a valid and invalid byte, which could allow an efficient brute force attack.
- 96480
- 96480
- 1037919
- 1037919
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2624
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2624
- https://gitlab.freedesktop.org/xorg/xserver/commit/d7ac755f0b618eb1259d93c8a16ec6e39a18627c
- https://gitlab.freedesktop.org/xorg/xserver/commit/d7ac755f0b618eb1259d93c8a16ec6e39a18627c
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- GLSA-201704-03
- GLSA-201704-03
- GLSA-201710-30
- GLSA-201710-30
- https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/
- https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/