GLSA 201704-03: X.Org: Multiple vulnerabilities
Severity: | high |
Title: | X.Org: Multiple vulnerabilities |
Date: | 04/10/2017 |
Bugs: |
|
ID: | 201704-03 |
Synopsis
Multiple vulnerabilities have been found in X.Org server and libraries, the worse of which allowing local attackers to execute arbitrary code.Background
X.Org X servers
Affected packages
Package | Vulnerable | Unaffected | Architecture(s) |
---|---|---|---|
x11-base/xorg-server | < 1.19.2 | >= 1.19.2 | All supported architectures |
x11-libs/libICE | < 1.0.9-r1 | >= 1.0.9-r1 | All supported architectures |
x11-libs/libXdmcp | < 1.1.2-r1 | >= 1.1.2-r1 | All supported architectures |
x11-libs/libXrender | < 0.9.10 | >= 0.9.10 | All supported architectures |
x11-libs/libXi | < 1.7.7 | >= 1.7.7 | All supported architectures |
x11-libs/libXrandr | < 1.5.1 | >= 1.5.1 | All supported architectures |
x11-libs/libXfixes | < 5.0.3 | >= 5.0.3 | All supported architectures |
x11-libs/libXv | < 1.0.11 | >= 1.0.11 | All supported architectures |
Description
Multiple vulnerabilities have been discovered in X.Org server and libraries. Please review the CVE identifiers referenced below for details.
Impact
A local or remote users can utilize the vulnerabilities to attach to the X.Org session as a user and execute arbitrary code.
Workaround
There is no known workaround at this time.
Resolution
All X.Org-server users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=x11-base/xorg-server-1.19.2"
All libICE users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=x11-libs/libICE-1.0.9-r1"
All libXdmcp users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=x11-libs/libXdmcp-1.1.2-r1"
All libXrender users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=x11-libs/libXrender-0.9.10"
All libXi users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=x11-libs/libXi-1.7.7"
All libXrandr users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=x11-libs/libXrandr-1.5.1"
All libXfixes users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=x11-libs/libXfixes-5.0.3"
All libXv users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=x11-libs/libXv-1.0.11"
References
CVE-2016-5407 CVE-2016-7942 CVE-2016-7943 CVE-2016-7944 CVE-2016-7945 CVE-2016-7946 CVE-2016-7947 CVE-2016-7948 CVE-2016-7949 CVE-2016-7950 CVE-2016-7953 CVE-2017-2624 CVE-2017-2625 CVE-2017-2626
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2010 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.