svn commit: r423472 - head/security/vuxml
Koop Mast
kwm at FreeBSD.org
Fri Oct 7 18:00:33 UTC 2016
Author: kwm
Date: Fri Oct 7 18:00:32 2016
New Revision: 423472
URL: https://svnweb.freebsd.org/changeset/ports/423472
Log:
Document X.org client libraries insufficient validation of data from
the X server vulnabilities.
Security: CVE-2016-5407
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Fri Oct 7 17:20:56 2016 (r423471)
+++ head/security/vuxml/vuln.xml Fri Oct 7 18:00:32 2016 (r423472)
@@ -58,6 +58,77 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="1cf65085-a760-41d2-9251-943e1af62eb8">
+ <topic>X.org libraries -- multiple vulnabilities</topic>
+ <affects>
+ <package>
+ <name>libX11</name>
+ <range><lt>1.6.4,1</lt></range>
+ </package>
+ <package>
+ <name>libXfixes</name>
+ <range><lt>5.0.2</lt></range>
+ </package>
+ <package>
+ <name>libXi</name>
+ <range><lt>1.7.7,1</lt></range>
+ </package>
+ <package>
+ <name>libXrandr</name>
+ <range><lt>1.5.1</lt></range>
+ </package>
+ <package>
+ <name>libXrender</name>
+ <range><lt>0.9.10</lt></range>
+ </package>
+ <package>
+ <name>libXtst</name>
+ <range><lt>1.2.3</lt></range>
+ </package>
+ <package>
+ <name>libXv</name>
+ <range><lt>1.0.11,1</lt></range>
+ </package>
+ <package>
+ <name>libXvMC</name>
+ <range><lt>1.0.10</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Matthieu Herrb reports:</p>
+ <blockquote cite="https://lists.x.org/archives/xorg-announce/2016-October/002720.html">
+ <p>Tobias Stoeckmann from the OpenBSD project has discovered a
+ number of issues in the way various X client libraries handle
+ the responses they receive from servers, and has worked with
+ X.Org's security team to analyze, confirm, and fix these issues.
+ These issue come in addition to the ones discovered by Ilja van
+ Sprundel in 2013.</p>
+
+ <p>Most of these issues stem from the client libraries trusting
+ the server to send correct protocol data, and not verifying
+ that the values will not overflow or cause other damage. Most
+ of the time X clients and servers are run by the same user, with
+ the server more privileged than the clients, so this is not a
+ problem, but there are scenarios in which a privileged client
+ can be connected to an unprivileged server, for instance,
+ connecting a setuid X client (such as a screen lock program)
+ to a virtual X server (such as Xvfb or Xephyr) which the user
+ has modified to return invalid data, potentially allowing the
+ user to escalate their privileges.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://lists.x.org/archives/xorg-announce/2016-October/002720.html</url>
+ <cvename>CVE-2016-5407</cvename>
+ </references>
+ <dates>
+ <discovery>2016-10-04</discovery>
+ <entry>2016-10-07</entry>
+ </dates>
+ </vuln>
+
<vuln vid="c8d902b1-8550-11e6-81e7-d050996490d0">
<topic>BIND -- Remote Denial of Service vulnerability</topic>
<affects>
More information about the svn-ports-all
mailing list