mirror of
https://git.FreeBSD.org/ports.git
synced 2025-01-04 06:15:24 +00:00
Document X.org client libraries insufficient validation of data from
the X server vulnabilities. Security: CVE-2016-5407
This commit is contained in:
parent
6315c9adec
commit
ccec89b158
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=423472
@ -58,6 +58,77 @@ Notes:
|
||||
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
|
||||
-->
|
||||
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
|
||||
<vuln vid="1cf65085-a760-41d2-9251-943e1af62eb8">
|
||||
<topic>X.org libraries -- multiple vulnabilities</topic>
|
||||
<affects>
|
||||
<package>
|
||||
<name>libX11</name>
|
||||
<range><lt>1.6.4,1</lt></range>
|
||||
</package>
|
||||
<package>
|
||||
<name>libXfixes</name>
|
||||
<range><lt>5.0.2</lt></range>
|
||||
</package>
|
||||
<package>
|
||||
<name>libXi</name>
|
||||
<range><lt>1.7.7,1</lt></range>
|
||||
</package>
|
||||
<package>
|
||||
<name>libXrandr</name>
|
||||
<range><lt>1.5.1</lt></range>
|
||||
</package>
|
||||
<package>
|
||||
<name>libXrender</name>
|
||||
<range><lt>0.9.10</lt></range>
|
||||
</package>
|
||||
<package>
|
||||
<name>libXtst</name>
|
||||
<range><lt>1.2.3</lt></range>
|
||||
</package>
|
||||
<package>
|
||||
<name>libXv</name>
|
||||
<range><lt>1.0.11,1</lt></range>
|
||||
</package>
|
||||
<package>
|
||||
<name>libXvMC</name>
|
||||
<range><lt>1.0.10</lt></range>
|
||||
</package>
|
||||
</affects>
|
||||
<description>
|
||||
<body xmlns="http://www.w3.org/1999/xhtml">
|
||||
<p>Matthieu Herrb reports:</p>
|
||||
<blockquote cite="https://lists.x.org/archives/xorg-announce/2016-October/002720.html">
|
||||
<p>Tobias Stoeckmann from the OpenBSD project has discovered a
|
||||
number of issues in the way various X client libraries handle
|
||||
the responses they receive from servers, and has worked with
|
||||
X.Org's security team to analyze, confirm, and fix these issues.
|
||||
These issue come in addition to the ones discovered by Ilja van
|
||||
Sprundel in 2013.</p>
|
||||
|
||||
<p>Most of these issues stem from the client libraries trusting
|
||||
the server to send correct protocol data, and not verifying
|
||||
that the values will not overflow or cause other damage. Most
|
||||
of the time X clients and servers are run by the same user, with
|
||||
the server more privileged than the clients, so this is not a
|
||||
problem, but there are scenarios in which a privileged client
|
||||
can be connected to an unprivileged server, for instance,
|
||||
connecting a setuid X client (such as a screen lock program)
|
||||
to a virtual X server (such as Xvfb or Xephyr) which the user
|
||||
has modified to return invalid data, potentially allowing the
|
||||
user to escalate their privileges.</p>
|
||||
</blockquote>
|
||||
</body>
|
||||
</description>
|
||||
<references>
|
||||
<url>https://lists.x.org/archives/xorg-announce/2016-October/002720.html</url>
|
||||
<cvename>CVE-2016-5407</cvename>
|
||||
</references>
|
||||
<dates>
|
||||
<discovery>2016-10-04</discovery>
|
||||
<entry>2016-10-07</entry>
|
||||
</dates>
|
||||
</vuln>
|
||||
|
||||
<vuln vid="c8d902b1-8550-11e6-81e7-d050996490d0">
|
||||
<topic>BIND -- Remote Denial of Service vulnerability</topic>
|
||||
<affects>
|
||||
|
Loading…
Reference in New Issue
Block a user