[ubuntu/trusty-security] xorg-server 2:1.15.1-0ubuntu2.9 (Accepted)
Marc Deslauriers
marc.deslauriers at canonical.com
Mon Jul 24 16:27:12 UTC 2017
xorg-server (2:1.15.1-0ubuntu2.9) trusty-security; urgency=medium
* SECURITY UPDATE: DoS and possible code execution in endianness
conversion of X Events
- debian/patches/CVE-2017-10971-1.patch: do not try to swap
GenericEvent in Xi/sendexev.c.
- debian/patches/CVE-2017-10971-2.patch: verify all events in
ProcXSendExtensionEvent in Xi/sendexev.c.
- debian/patches/CVE-2017-10971-3.patch: disallow GenericEvent in
SendEvent request in dix/events.c, dix/swapreq.c.
- CVE-2017-10971
* SECURITY UPDATE: information leak in XEvent handling
- debian/patches/CVE-2017-10972.patch: zero target buffer in
SProcXSendExtensionEvent in Xi/sendexev.c.
- CVE-2017-10972
* SECURITY UPDATE: MIT-MAGIC-COOKIES timing attack
- debian/patches/CVE-2017-2624.patch: use timingsafe_memcmp() in
configure.ac, include/dix-config.h.in, include/os.h,
os/mitauth.c, os/timingsafe_memcmp.c.
- CVE-2017-2624
* debian/patches/fix_test_failure.patch: fix ftbfs on armhf due to
uninitialized values.
Date: 2017-07-20 19:08:14.790820+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/xorg-server/2:1.15.1-0ubuntu2.9
-------------- next part --------------
Sorry, changesfile not available.
More information about the Trusty-changes
mailing list