ALT-PU-2019-2023-1
Package xorg-server updated to version 1.19.7-alt0.M80P.1 for branch c8.1 in task 229588.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-10971
In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events.
- DSA-3905
- DSA-3905
- 99546
- 99546
- https://bugzilla.suse.com/show_bug.cgi?id=1035283
- https://bugzilla.suse.com/show_bug.cgi?id=1035283
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=8caed4df36b1f802b4992edcfd282cbeeec35d9d
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=8caed4df36b1f802b4992edcfd282cbeeec35d9d
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=ba336b24052122b136486961c82deac76bbde455
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=ba336b24052122b136486961c82deac76bbde455
Modified: 2024-11-21
CVE-2017-10972
Uninitialized data in endianness conversion in the XEvent handling of the X.Org X Server before 2017-06-19 allowed authenticated malicious users to access potentially privileged data from the X server.
- DSA-3905
- DSA-3905
- 99543
- 99543
- https://bugzilla.suse.com/show_bug.cgi?id=1035283
- https://bugzilla.suse.com/show_bug.cgi?id=1035283
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=05442de962d3dc624f79fc1a00eca3ffc5489ced
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=05442de962d3dc624f79fc1a00eca3ffc5489ced
Modified: 2024-11-21
CVE-2017-12176
xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
- https://bugzilla.redhat.com/show_bug.cgi?id=1509214
- https://bugzilla.redhat.com/show_bug.cgi?id=1509214
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- GLSA-201711-05
- GLSA-201711-05
- DSA-4000
- DSA-4000
Modified: 2024-11-21
CVE-2017-12177
xorg-x11-server before 1.19.5 was vulnerable to integer overflow in ProcDbeGetVisualInfo function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
- https://bugzilla.redhat.com/show_bug.cgi?id=1509218
- https://bugzilla.redhat.com/show_bug.cgi?id=1509218
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=4ca68b878e851e2136c234f40a25008297d8d831
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=4ca68b878e851e2136c234f40a25008297d8d831
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- GLSA-201711-05
- GLSA-201711-05
- DSA-4000
- DSA-4000
Modified: 2024-11-21
CVE-2017-12178
xorg-x11-server before 1.19.5 had wrong extra length check in ProcXIChangeHierarchy function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
- https://bugzilla.redhat.com/show_bug.cgi?id=1509219
- https://bugzilla.redhat.com/show_bug.cgi?id=1509219
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=859b08d523307eebde7724fd1a0789c44813e821
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=859b08d523307eebde7724fd1a0789c44813e821
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- GLSA-201711-05
- GLSA-201711-05
- DSA-4000
- DSA-4000
Modified: 2024-11-21
CVE-2017-12179
xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
- https://bugzilla.redhat.com/show_bug.cgi?id=1509220
- https://bugzilla.redhat.com/show_bug.cgi?id=1509220
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=d088e3c1286b548a58e62afdc70bb40981cdb9e8
- GLSA-201711-05
- GLSA-201711-05
- DSA-4000
- DSA-4000
Modified: 2024-11-21
CVE-2017-12180
xorg-x11-server before 1.19.5 was missing length validation in XFree86 VidModeExtension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
- https://bugzilla.redhat.com/show_bug.cgi?id=1509221
- https://bugzilla.redhat.com/show_bug.cgi?id=1509221
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=1b1d4c04695dced2463404174b50b3581dbd857b
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=1b1d4c04695dced2463404174b50b3581dbd857b
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- GLSA-201711-05
- GLSA-201711-05
- DSA-4000
- DSA-4000
Modified: 2024-11-21
CVE-2017-12181
xorg-x11-server before 1.19.5 was missing length validation in XFree86 DGA extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
- https://bugzilla.redhat.com/show_bug.cgi?id=1509222
- https://bugzilla.redhat.com/show_bug.cgi?id=1509222
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=1b1d4c04695dced2463404174b50b3581dbd857b
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=1b1d4c04695dced2463404174b50b3581dbd857b
- GLSA-201711-05
- GLSA-201711-05
- DSA-4000
- DSA-4000
Modified: 2024-11-21
CVE-2017-12182
xorg-x11-server before 1.19.5 was missing length validation in XFree86 DRI extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
- https://bugzilla.redhat.com/show_bug.cgi?id=1509223
- https://bugzilla.redhat.com/show_bug.cgi?id=1509223
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=1b1d4c04695dced2463404174b50b3581dbd857b
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=1b1d4c04695dced2463404174b50b3581dbd857b
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- GLSA-201711-05
- GLSA-201711-05
- DSA-4000
- DSA-4000
Modified: 2024-11-21
CVE-2017-12183
xorg-x11-server before 1.19.5 was missing length validation in XFIXES extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
- https://bugzilla.redhat.com/show_bug.cgi?id=1509224
- https://bugzilla.redhat.com/show_bug.cgi?id=1509224
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=55caa8b08c84af2b50fbc936cf334a5a93dd7db5
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=55caa8b08c84af2b50fbc936cf334a5a93dd7db5
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- GLSA-201711-05
- GLSA-201711-05
- DSA-4000
- DSA-4000
Modified: 2024-11-21
CVE-2017-12184
xorg-x11-server before 1.19.5 was missing length validation in XINERAMA extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
- https://bugzilla.redhat.com/show_bug.cgi?id=1509225
- https://bugzilla.redhat.com/show_bug.cgi?id=1509225
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=cad5a1050b7184d828aef9c1dd151c3ab649d37e
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=cad5a1050b7184d828aef9c1dd151c3ab649d37e
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- DSA-4000
- DSA-4000
Modified: 2024-11-21
CVE-2017-12185
xorg-x11-server before 1.19.5 was missing length validation in MIT-SCREEN-SAVER extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
- https://bugzilla.redhat.com/show_bug.cgi?id=1509215
- https://bugzilla.redhat.com/show_bug.cgi?id=1509215
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=cad5a1050b7184d828aef9c1dd151c3ab649d37e
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=cad5a1050b7184d828aef9c1dd151c3ab649d37e
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- DSA-4000
- DSA-4000
Modified: 2024-11-21
CVE-2017-12186
xorg-x11-server before 1.19.5 was missing length validation in X-Resource extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
- https://bugzilla.redhat.com/show_bug.cgi?id=1509216
- https://bugzilla.redhat.com/show_bug.cgi?id=1509216
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=cad5a1050b7184d828aef9c1dd151c3ab649d37e
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=cad5a1050b7184d828aef9c1dd151c3ab649d37e
- DSA-4000
- DSA-4000
Modified: 2024-11-21
CVE-2017-12187
xorg-x11-server before 1.19.5 was missing length validation in RENDER extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
- https://bugzilla.redhat.com/show_bug.cgi?id=1509217
- https://bugzilla.redhat.com/show_bug.cgi?id=1509217
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=cad5a1050b7184d828aef9c1dd151c3ab649d37e
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=cad5a1050b7184d828aef9c1dd151c3ab649d37e
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- DSA-4000
- DSA-4000
Modified: 2024-11-21
CVE-2017-13721
In X.Org Server (aka xserver and xorg-server) before 1.19.4, an attacker authenticated to an X server with the X shared memory extension enabled can cause aborts of the X server or replace shared memory segments of other X clients in the same session.
- DSA-4000
- DSA-4000
- [oss-security] 20171004 Fwd: X server fixes for CVE-2017-13721 & CVE-2017-13723
- [oss-security] 20171004 Fwd: X server fixes for CVE-2017-13721 & CVE-2017-13723
- 101238
- 101238
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=b95f25af141d33a65f6f821ea9c003f66a01e1f1
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=b95f25af141d33a65f6f821ea9c003f66a01e1f1
- [xorg-announce] 20171004 [ANNOUNCE] xorg-server 1.19.4
- [xorg-announce] 20171004 [ANNOUNCE] xorg-server 1.19.4
- GLSA-201710-30
- GLSA-201710-30
Modified: 2024-11-21
CVE-2017-13723
In X.Org Server (aka xserver and xorg-server) before 1.19.4, a local attacker authenticated to the X server could overflow a global buffer, causing crashes of the X server or potentially other problems by injecting large or malformed XKB related atoms and accessing them via xkbcomp.
- DSA-4000
- DSA-4000
- [oss-security] 20171004 Fwd: X server fixes for CVE-2017-13721 & CVE-2017-13723
- [oss-security] 20171004 Fwd: X server fixes for CVE-2017-13721 & CVE-2017-13723
- 101253
- 101253
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=94f11ca5cf011ef123bd222cabeaef6f424d76ac
- https://cgit.freedesktop.org/xorg/xserver/commit/?id=94f11ca5cf011ef123bd222cabeaef6f424d76ac
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- [xorg-announce] 20171004 [ANNOUNCE] xorg-server 1.19.4
- [xorg-announce] 20171004 [ANNOUNCE] xorg-server 1.19.4
- GLSA-201710-30
- GLSA-201710-30
Modified: 2024-11-21
CVE-2017-2624
It was found that xorg-x11-server before 1.19.0 including uses memcmp() to check the received MIT cookie against a series of valid cookies. If the cookie is correct, it is allowed to attach to the Xorg session. Since most memcmp() implementations return after an invalid byte is seen, this causes a time difference between a valid and invalid byte, which could allow an efficient brute force attack.
- 96480
- 96480
- 1037919
- 1037919
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2624
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2624
- https://gitlab.freedesktop.org/xorg/xserver/commit/d7ac755f0b618eb1259d93c8a16ec6e39a18627c
- https://gitlab.freedesktop.org/xorg/xserver/commit/d7ac755f0b618eb1259d93c8a16ec6e39a18627c
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- [debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
- GLSA-201704-03
- GLSA-201704-03
- GLSA-201710-30
- GLSA-201710-30
- https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/
- https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/
Closed bugs
Не автоиспользует modesetting для Intel
требуется указывать VDPAU_DRIVER=va_gl