svn commit: r543910 - head/security/vuxml
Niclas Zeising
zeising at FreeBSD.org
Sat Aug 1 13:50:10 UTC 2020
Author: zeising
Date: Sat Aug 1 13:50:09 2020
New Revision: 543910
URL: https://svnweb.freebsd.org/changeset/ports/543910
Log:
vuxml: Document vulns in xorg-server and libX11
Document two vulnerabilities, one in xorg-server and one in libX11.
The one in libX11 is a heap corruption vulnerability. [1]
The one in xorg-server (and slave ports) is a uninitialized memory
disclosure. [2]
Security: CVE-2020-14344[1], CVE-2020-14347 [2]
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Sat Aug 1 13:18:38 2020 (r543909)
+++ head/security/vuxml/vuln.xml Sat Aug 1 13:50:09 2020 (r543910)
@@ -58,6 +58,86 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="3c7ba82a-d3fb-11ea-9aba-0c9d925bbbc0">
+ <topic>xorg-server -- Pixel Data Uninitialized Memory Information Disclosure</topic>
+ <affects>
+ <package>
+ <name>xorg-server</name>
+ <range><lt>1.20.8_3,1</lt></range>
+ </package>
+ <package>
+ <name>xephyr</name>
+ <range><lt>1.20.8_3,1</lt></range>
+ </package>
+ <package>
+ <name>xorg-vfbserver</name>
+ <range><lt>1.20.8_3,1</lt></range>
+ </package>
+ <package>
+ <name>xorg-nestserver</name>
+ <range><lt>1.20.8_3,1</lt></range>
+ </package>
+ <package>
+ <name>xwayland</name>
+ <range><lt>1.20.8_3,1</lt></range>
+ </package>
+ <package>
+ <name>xorg-dmx</name>
+ <range><lt>1.20.8_3,1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The X.org project reports:</p>
+ <blockquote cite="https://lists.x.org/archives/xorg-announce/2020-July/003051.html">
+ <p>Allocation for pixmap data in AllocatePixmap() does not initialize
+ the memory in xserver, it leads to leak uninitialize heap memory to
+ clients. When the X server runs with elevated privileges.</p>
+ <p>This flaw can lead to ASLR bypass, which when combined with other
+ flaws (known/unknown) could lead to lead to privilege elevation in
+ the client.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://lists.x.org/archives/xorg-announce/2020-July/003051.html</url>
+ <cvename>CVE-2020-14347</cvename>
+ </references>
+ <dates>
+ <discovery>2020-07-31</discovery>
+ <entry>2020-08-01</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="6faa7feb-d3fa-11ea-9aba-0c9d925bbbc0">
+ <topic>libX11 -- Heap corruption in the X input method client in libX11</topic>
+ <affects>
+ <package>
+ <name>libX11</name>
+ <range><lt>1.6.9_3,1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The X.org project reports:</p>
+ <blockquote cite="https://lists.x.org/archives/xorg-announce/2020-July/003050.html">
+ <p>The X Input Method (XIM) client implementation in libX11 has some
+ integer overflows and signed/unsigned comparison issues that can
+ lead to heap corruption when handling malformed messages from an
+ input method.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://lists.x.org/archives/xorg-announce/2020-July/003050.html</url>
+ <cvename>CVE-2020-14344</cvename>
+ </references>
+ <dates>
+ <discovery>2020-07-31</discovery>
+ <entry>2020-08-01</entry>
+ </dates>
+ </vuln>
+
<vuln vid="7d7221ee-d334-11ea-bc50-080027846a02">
<topic>Python -- multiple vulnerabilities</topic>
<affects>
More information about the svn-ports-head
mailing list