– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Gentoo Linux Security Advisory GLSA 201701-64
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
https://security.gentoo.org/
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Severity: Normal
Title: X.Org X Server: Multiple vulnerabilities
Date: January 25, 2017
Bugs: #493294, #548002, #551680
ID: 201701-64
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Synopsis
========
Multiple vulnerabilities have been found in X.Org X Server, the worst
of which may allow authenticated attackers to read from or send
information to arbitrary X11 clients.
Background
==========
The X Window System is a graphical windowing system based on a
client/server model.
Affected packages
=================
——————————————————————-
Package / Vulnerable / Unaffected
——————————————————————-
1 x11-base/xorg-server < 1.18.4 >= 1.18.4
Description
===========
Multiple vulnerabilities have been discovered in X.Org X Server. Please
review the CVE identifiers referenced below for details.
Impact
======
An authenticated attacker could possibly cause a Denial of Service
condition or read from or send information to arbitrary X11 clients.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All X.Org X Server users should upgrade to the latest version:
# emerge –sync
# emerge –ask –oneshot –verbose “>=x11-base/xorg-server-1.18.4”
References
==========
[ 1 ] CVE-2013-6424
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6424
[ 2 ] CVE-2015-3164
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3164
[ 3 ] CVE-2015-3418
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3418
[ 4 ] X.Org/Wayland Security Advisory: Missing authentication in
XWayland
https://lists.x.org/archives/xorg-announce/2015-June/002611.html
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201701-64
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users’ machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons – Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2.0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=8wHd
—–END PGP SIGNATURE—–