Lucene search

K
centosCentOS ProjectCESA-2014:1436
HistoryOct 20, 2014 - 6:09 p.m.

libX11, libXcursor, libXext, libXfixes, libXi, libXinerama, libXp, libXrandr, libXrender, libXres, libXt, libXtst, libXv, libXvMC, libXxf86dga, libXxf86vm, libdmx, libxcb, xcb, xkeyboard, xorg security update

2014-10-2018:09:28
CentOS Project
lists.centos.org
89

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.026 Low

EPSS

Percentile

90.1%

CentOS Errata and Security Advisory CESA-2014:1436

The X11 (Xorg) libraries provide library routines that are used within all
X Window applications.

Multiple integer overflow flaws, leading to heap-based buffer overflows,
were found in the way various X11 client libraries handled certain protocol
data. An attacker able to submit invalid protocol data to an X11 server via
a malicious X11 client could use either of these flaws to potentially
escalate their privileges on the system. (CVE-2013-1981, CVE-2013-1982,
CVE-2013-1983, CVE-2013-1984, CVE-2013-1985, CVE-2013-1986, CVE-2013-1987,
CVE-2013-1988, CVE-2013-1989, CVE-2013-1990, CVE-2013-1991, CVE-2013-2003,
CVE-2013-2062, CVE-2013-2064)

Multiple array index errors, leading to heap-based buffer out-of-bounds
write flaws, were found in the way various X11 client libraries handled
data returned from an X11 server. A malicious X11 server could possibly use
this flaw to execute arbitrary code with the privileges of the user running
an X11 client. (CVE-2013-1997, CVE-2013-1998, CVE-2013-1999, CVE-2013-2000,
CVE-2013-2001, CVE-2013-2002, CVE-2013-2066)

A buffer overflow flaw was found in the way the XListInputDevices()
function of X.Org X11’s libXi runtime library handled signed numbers.
A malicious X11 server could possibly use this flaw to execute arbitrary
code with the privileges of the user running an X11 client. (CVE-2013-1995)

A flaw was found in the way the X.Org X11 libXt runtime library used
uninitialized pointers. A malicious X11 server could possibly use this flaw
to execute arbitrary code with the privileges of the user running an X11
client. (CVE-2013-2005)

Two stack-based buffer overflow flaws were found in the way libX11, the
Core X11 protocol client library, processed certain user-specified files.
A malicious X11 server could possibly use this flaw to crash an X11 client
via a specially crafted file. (CVE-2013-2004)

The xkeyboard-config package has been upgraded to upstream version 2.11,
which provides a number of bug fixes and enhancements over the previous
version. (BZ#1077471)

This update also fixes the following bugs:

  • Previously, updating the mesa-libGL package did not update the libX11
    package, although it was listed as a dependency of mesa-libGL. This bug has
    been fixed and updating mesa-libGL now updates all dependent packages as
    expected. (BZ#1054614)

  • Previously, closing a customer application could occasionally cause the X
    Server to terminate unexpectedly. After this update, the X Server no longer
    hangs when a user closes a customer application. (BZ#971626)

All X11 client libraries users are advised to upgrade to these updated
packages, which correct these issues and add these enhancements.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-cr-announce/2014-October/027503.html
https://lists.centos.org/pipermail/centos-cr-announce/2014-October/027534.html
https://lists.centos.org/pipermail/centos-cr-announce/2014-October/027535.html
https://lists.centos.org/pipermail/centos-cr-announce/2014-October/027536.html
https://lists.centos.org/pipermail/centos-cr-announce/2014-October/027537.html
https://lists.centos.org/pipermail/centos-cr-announce/2014-October/027538.html
https://lists.centos.org/pipermail/centos-cr-announce/2014-October/027539.html
https://lists.centos.org/pipermail/centos-cr-announce/2014-October/027540.html
https://lists.centos.org/pipermail/centos-cr-announce/2014-October/027541.html
https://lists.centos.org/pipermail/centos-cr-announce/2014-October/027542.html
https://lists.centos.org/pipermail/centos-cr-announce/2014-October/027543.html
https://lists.centos.org/pipermail/centos-cr-announce/2014-October/027544.html
https://lists.centos.org/pipermail/centos-cr-announce/2014-October/027545.html
https://lists.centos.org/pipermail/centos-cr-announce/2014-October/027546.html
https://lists.centos.org/pipermail/centos-cr-announce/2014-October/027547.html
https://lists.centos.org/pipermail/centos-cr-announce/2014-October/027548.html
https://lists.centos.org/pipermail/centos-cr-announce/2014-October/027549.html
https://lists.centos.org/pipermail/centos-cr-announce/2014-October/027550.html
https://lists.centos.org/pipermail/centos-cr-announce/2014-October/027669.html
https://lists.centos.org/pipermail/centos-cr-announce/2014-October/027676.html
https://lists.centos.org/pipermail/centos-cr-announce/2014-October/027727.html
https://lists.centos.org/pipermail/centos-cr-announce/2014-October/027730.html

Affected packages:
libX11
libX11-common
libX11-devel
libXcursor
libXcursor-devel
libXext
libXext-devel
libXfixes
libXfixes-devel
libXi
libXi-devel
libXinerama
libXinerama-devel
libXp
libXp-devel
libXrandr
libXrandr-devel
libXrender
libXrender-devel
libXres
libXres-devel
libXt
libXt-devel
libXtst
libXtst-devel
libXv
libXv-devel
libXvMC
libXvMC-devel
libXxf86dga
libXxf86dga-devel
libXxf86vm
libXxf86vm-devel
libdmx
libdmx-devel
libxcb
libxcb-devel
libxcb-doc
libxcb-python
xcb-proto
xkeyboard-config
xkeyboard-config-devel
xorg-x11-proto-devel
xorg-x11-xtrans-devel

Upstream details at:
https://access.redhat.com/errata/RHSA-2014:1436

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.026 Low

EPSS

Percentile

90.1%