Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2017:1675-1

Опубликовано: 26 июн. 2017
Источник: suse-cvrf

Описание

Security update for xorg-x11-server

This update for xorg-x11-server provides the following fixes:

  • Remove unused function with use-after-free issue. (bsc#1025035)
  • Use arc4random to generate cookies. (bsc#1025084)
  • Prevent timing attack against MIT cookie. (bsc#1025029, CVE-2017-2624)
  • XDrawArc performance improvement. (bsc#1019649)
  • Re-enable indirect GLX by default. (bsc#1039042)
  • Add IndirectGLX ServerFlags option which allows users to enable or disable indirect GLX. (bsc#1032509)
  • Fix dashing in GLAMOR. (bsc#1021803)
  • Fix X server crash on drawing dashed lines. (bsc#1025985)

Список пакетов

SUSE Linux Enterprise Desktop 12 SP2
xorg-x11-server-7.6_1.18.3-71.1
xorg-x11-server-extra-7.6_1.18.3-71.1
SUSE Linux Enterprise Server 12 SP2
xorg-x11-server-7.6_1.18.3-71.1
xorg-x11-server-extra-7.6_1.18.3-71.1
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2
xorg-x11-server-7.6_1.18.3-71.1
xorg-x11-server-extra-7.6_1.18.3-71.1
SUSE Linux Enterprise Server for SAP Applications 12 SP2
xorg-x11-server-7.6_1.18.3-71.1
xorg-x11-server-extra-7.6_1.18.3-71.1
SUSE Linux Enterprise Software Development Kit 12 SP2
xorg-x11-server-sdk-7.6_1.18.3-71.1

Описание

It was found that xorg-x11-server before 1.19.0 including uses memcmp() to check the received MIT cookie against a series of valid cookies. If the cookie is correct, it is allowed to attach to the Xorg session. Since most memcmp() implementations return after an invalid byte is seen, this causes a time difference between a valid and invalid byte, which could allow an efficient brute force attack.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP2:xorg-x11-server-7.6_1.18.3-71.1
SUSE Linux Enterprise Desktop 12 SP2:xorg-x11-server-extra-7.6_1.18.3-71.1
SUSE Linux Enterprise Server 12 SP2:xorg-x11-server-7.6_1.18.3-71.1
SUSE Linux Enterprise Server 12 SP2:xorg-x11-server-extra-7.6_1.18.3-71.1

Ссылки