| Summary: | <x11-base/xorg-server-1.19.5: Multiple vulnerabilities | ||
|---|---|---|---|
| Product: | Gentoo Security | Reporter: | Christopher Díaz Riveros (RETIRED) <chrisadr> |
| Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
| Status: | RESOLVED FIXED | ||
| Severity: | normal | CC: | x11 |
| Priority: | Normal | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | https://lists.x.org/archives/xorg-announce/2017-October/002814.html | ||
| Whiteboard: | A2 [glsa cve] | ||
| Package list: | Runtime testing required: | --- | |
| Bug Depends on: | |||
| Bug Blocks: | 633910 | ||
@Maintainers please let us know when everything is fixed and tree is clean. Thank you Vulnerable versions removed in commit 67af98328e08ad9e53a857d1b51c9ecea8716ead Author: Matt Turner <mattst88@gentoo.org> Date: Mon Oct 30 18:44:14 2017 -0700 x11-base/xorg-server: Drop vulnerable versions @security, please add to CVE. This issue was resolved and addressed in GLSA 201711-05 at https://security.gentoo.org/glsa/201711-05 by GLSA coordinator Aaron Bauman (b-man). |
From URL: One regression fix since 1.19.4 (mea culpa), and fixes for CVEs 2017- 12176 through 2017-12187. C is a terrible language, please stop writing code in it. Adam Jackson (2): Revert "xf86-video-modesetting: Add ms_queue_vblank helper [v3]" xserver 1.19.5 Michal Srb (1): os: Make sure big requests have sufficient length. Nathan Kidd (7): Unvalidated lengths xfixes: unvalidated lengths (CVE-2017-12183) hw/xfree86: unvalidated lengths Xi: integer overflow and unvalidated length in (S)ProcXIBarrierReleasePointer Xi: fix wrong extra length check in ProcXIChangeHierarchy (CVE-2017-12178) dbe: Unvalidated variable-length request in ProcDbeGetVisualInfo (CVE-2017-12177) Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176)