desktop-packages team mailing list archive
-
desktop-packages team
-
Mailing list archive
-
Message #100184
[Bug 1420643] Re: X.Org Server 1.17.1 Released To Fix CVE-2015-0255
** Description changed:
- The vulnerability addressed by xorg-server 1.17.1 is CVE-2015-0255, which was made public today. The newest X.Org CVE is described as:
- Olivier Fourdan from Red Hat has discovered a protocol handling issue in the way the X server code base handles the XkbSetGeometry request.
+ The vulnerability addressed by xorg-server 1.17.1 is CVE-2015-0255, which was made public today. The newest X.Org CVE is described as:
+ Olivier Fourdan from Red Hat has discovered a protocol handling issue in the way the X server code base handles the XkbSetGeometry request.
The issue stems from the server trusting the client to send valid string
lengths in the request data. A malicious client with string lengths
exceeding the request length can cause the server to copy adjacent
memory data into the XKB structs. This data is then available to the
client via the XkbGetGeometry request. The data length is at least up to
64k, it is possible to obtain more data by chaining strings, each string
length is then determined by whatever happens to be in that 16-bit
region of memory.
A similarly crafted request can likely cause the X server to crash.
This issue has been assigned CVE-2015-0255
+ http://lists.freedesktop.org/archives/xorg/2015-February/057158.html
Hope vivid will soon get that upgrade, as it still has 1.16.2.901
** Description changed:
The vulnerability addressed by xorg-server 1.17.1 is CVE-2015-0255, which was made public today. The newest X.Org CVE is described as:
Olivier Fourdan from Red Hat has discovered a protocol handling issue in the way the X server code base handles the XkbSetGeometry request.
The issue stems from the server trusting the client to send valid string
lengths in the request data. A malicious client with string lengths
exceeding the request length can cause the server to copy adjacent
memory data into the XKB structs. This data is then available to the
client via the XkbGetGeometry request. The data length is at least up to
64k, it is possible to obtain more data by chaining strings, each string
length is then determined by whatever happens to be in that 16-bit
region of memory.
A similarly crafted request can likely cause the X server to crash.
This issue has been assigned CVE-2015-0255
http://lists.freedesktop.org/archives/xorg/2015-February/057158.html
+ with avaliable patch
Hope vivid will soon get that upgrade, as it still has 1.16.2.901
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1420643
Title:
X.Org Server 1.17.1 Released To Fix CVE-2015-0255
Status in xorg package in Ubuntu:
New
Bug description:
The vulnerability addressed by xorg-server 1.17.1 is CVE-2015-0255, which was made public today. The newest X.Org CVE is described as:
Olivier Fourdan from Red Hat has discovered a protocol handling issue in the way the X server code base handles the XkbSetGeometry request.
The issue stems from the server trusting the client to send valid
string lengths in the request data. A malicious client with string
lengths exceeding the request length can cause the server to copy
adjacent memory data into the XKB structs. This data is then available
to the client via the XkbGetGeometry request. The data length is at
least up to 64k, it is possible to obtain more data by chaining
strings, each string length is then determined by whatever happens to
be in that 16-bit region of memory.
A similarly crafted request can likely cause the X server to crash.
This issue has been assigned CVE-2015-0255
http://lists.freedesktop.org/archives/xorg/2015-February/057158.html
with avaliable patch
Hope vivid will soon get that upgrade, as it still has 1.16.2.901
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xorg/+bug/1420643/+subscriptions
References