https://bugs.freedesktop.org/show_bug.cgi?id=63353 https://bugzilla.redhat.com/show_bug.cgi?id=950438 "xorg-server-1.13.4 and xorg-server-1.14.1 have been released with the fixes for this issue. No additional stable releases are planned at this point, users relying on 1.12 or earlier servers will have to apply the patch themselves." Reproducible: Always
Fixed in: xorg-server-1.9.5-r2 xorg-server-1.10.6-r2 xorg-server-1.11.4-r2 xorg-server-1.12.4-r1 xorg-server-1.13.4
(In reply to comment #1) > Fixed in: > xorg-server-1.9.5-r2 > xorg-server-1.10.6-r2 > xorg-server-1.11.4-r2 > xorg-server-1.12.4-r1 > xorg-server-1.13.4 Which version we need to stabilize?
Arches, please stabilize the versions mentioned in comment 1.
amd64 stable
x86 stable
arm stable
ia64 stable
ppc stable
ppc64 stable
s390 stable
sh stable
sparc stable
Stable for HPPA.
alpha stable
Vulnerable versions have been removed from the tree.
CVE-2013-1940 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1940): X.Org X server before 1.13.4 and 1.4.x before 1.14.1 does not properly restrict access to input events when adding a new hot-plug device, which might allow physically proximate attackers to obtain sensitive information, as demonstrated by reading passwords from a tty.
Thanks everyone. Added to existing GLSA draft
This issue was resolved and addressed in GLSA 201405-07 at http://security.gentoo.org/glsa/glsa-201405-07.xml by GLSA coordinator Mikle Kolyada (Zlogene).