Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 7 Oct 2016 18:00:32 +0000 (UTC)
From:      Koop Mast <kwm@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r423472 - head/security/vuxml
Message-ID:  <201610071800.u97I0WZq043801@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: kwm
Date: Fri Oct  7 18:00:32 2016
New Revision: 423472
URL: https://svnweb.freebsd.org/changeset/ports/423472

Log:
  Document X.org client libraries insufficient validation of data from
  the X server vulnabilities.
  
  Security:	CVE-2016-5407

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Fri Oct  7 17:20:56 2016	(r423471)
+++ head/security/vuxml/vuln.xml	Fri Oct  7 18:00:32 2016	(r423472)
@@ -58,6 +58,77 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="1cf65085-a760-41d2-9251-943e1af62eb8">
+    <topic>X.org libraries -- multiple vulnabilities</topic>
+    <affects>
+      <package>
+	<name>libX11</name>
+	<range><lt>1.6.4,1</lt></range>
+      </package>
+      <package>
+	<name>libXfixes</name>
+	<range><lt>5.0.2</lt></range>
+      </package>
+      <package>
+	<name>libXi</name>
+	<range><lt>1.7.7,1</lt></range>
+      </package>
+      <package>
+	<name>libXrandr</name>
+	<range><lt>1.5.1</lt></range>
+      </package>
+      <package>
+	<name>libXrender</name>
+	<range><lt>0.9.10</lt></range>
+      </package>
+      <package>
+	<name>libXtst</name>
+	<range><lt>1.2.3</lt></range>
+      </package>
+      <package>
+	<name>libXv</name>
+	<range><lt>1.0.11,1</lt></range>
+      </package>
+      <package>
+	<name>libXvMC</name>
+	<range><lt>1.0.10</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Matthieu Herrb reports:</p>
+	<blockquote cite="https://lists.x.org/archives/xorg-announce/2016-October/002720.html">;
+	  <p>Tobias Stoeckmann from the OpenBSD project has discovered a
+	    number of issues in the way various X client libraries handle
+	    the responses they receive from servers, and has worked with
+	    X.Org's security team to analyze, confirm, and fix these issues.
+	    These issue come in addition to the ones discovered by Ilja van
+	    Sprundel in 2013.</p>
+
+	  <p>Most of these issues stem from the client libraries trusting
+	    the server to send correct protocol data, and not verifying
+	    that the values will not overflow or cause other damage. Most
+	    of the time X clients and servers are run by the same user, with
+	    the server more privileged than the clients, so this is not a
+	    problem, but there are scenarios in which a privileged client
+	    can be connected to an unprivileged server, for instance,
+	    connecting a setuid X client (such as a screen lock program)
+	    to a virtual X server (such as Xvfb or Xephyr) which the user
+	    has modified to return invalid data, potentially allowing the
+	    user to escalate their privileges.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://lists.x.org/archives/xorg-announce/2016-October/002720.html</url>;
+      <cvename>CVE-2016-5407</cvename>
+    </references>
+    <dates>
+      <discovery>2016-10-04</discovery>
+      <entry>2016-10-07</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="c8d902b1-8550-11e6-81e7-d050996490d0">
     <topic>BIND -- Remote Denial of Service vulnerability</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201610071800.u97I0WZq043801>