Summary: | <x11-base/xorg-server-1.12.4-r5: divide-by-zero when calculating image height (CVE-2015-3418) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | x11 |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1216020 | ||
Whiteboard: | A3 [glsa cve] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
![]() This issue obviously does not affect our latest stable xorg but only 1.12.4-r4. You can choose between: 1) Patch and stabilize 1.12 2) Remove 1.12 The fix has now been committed to the tree. The only stable version of xorg-server which was ever affected by this bug is 1.12.4-r4. Arches, please stabilize x11-base/xorg-server-1.12.4-r5 amd64 stable x86 stable (In reply to Agostino Sarubbo from comment #4) > amd64 stable No. (In reply to Agostino Sarubbo from comment #5) > x86 stable No. Stable for PPC64. amd64 stable x86 stable arm stable sparc stable ppc stable alpha stable CVE-2015-3418 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3418): ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. ** TEMPORARY ** A divide-by-zero flaw was found in the way the X.Org server calculated the height of certain images. A malicious, authenticated client could use this flaw to crash the X.Org server. ia64 stable All arches are done. New GLSA Request filed. Maintainer(s), please drop the vulnerable version(s). Cleanup done. This issue was resolved and addressed in GLSA 201701-64 at https://security.gentoo.org/glsa/201701-64 by GLSA coordinator Thomas Deutschmann (whissi). |