lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20080119131016.GA4581@galadriel.inutil.org>
Date: Sat, 19 Jan 2008 14:10:16 +0100
From: Moritz Muehlenhoff <jmm@...ian.org>
To: debian-security-announce@...ts.debian.org
Subject: [SECURITY] [DSA 1466-2] New xorg-server packages
	fix regression

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-1466-2                  security@...ian.org
http://www.debian.org/security/                       Moritz Muehlenhoff
January 19, 2008                      http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package        : xorg-server, libxfont, xfree86
Vulnerability  : several
Problem type   : local
Debian-specific: no
CVE Id(s)      : CVE-2007-5760 CVE-2007-5958 CVE-2007-6427 CVE-2007-6428 CVE-2007-6429 CVE-2008-0006

The X.org fix for CVE-2007-6429 introduced a regression in the MIT-SHM
extension, which prevented the start of a few applications. This update
fixes this problem and also references the patch for CVE-2008-0006,
which was included in the previous update, but not mentioned in the
advisory text.

Several local vulnerabilities have been discovered in the X.Org X
server. The Common Vulnerabilities and Exposures project identifies the
following problems:

CVE-2007-5760

    "regenrecht" discovered that missing input sanitising within
    the XFree86-Misc extension may lead to local privilege escalation.

CVE-2007-5958

    It was discovered that error messages of security policy file
    handling may lead to a minor information leak disclosing the
    existance of files otherwise unaccessible to the user.

CVE-2007-6427

    "regenrecht" discovered that missing input sanitising within
    the XInput-Misc extension may lead to local privilege escalation.

CVE-2007-6428

    "regenrecht" discovered that missing input sanitising within
    the TOG-CUP extension may lead to disclosure of memory contents.

CVE-2007-6429

    "regenrecht" discovered that integer overflows in the EVI
    and MIT-SHM extensions may lead to local privilege escalation.

CVE-2008-0006

   It was discovered that insufficient validation of PCF fonts could lead
   to local privilege escalation.

For the unstable distribution (sid), this problem has been fixed in
version 2:1.4.1~git20080118-1 of xorg-server and version 1:1.3.1-2
of libxfont.

For the stable distribution (etch), this problem has been fixed in
version 1.1.1-21etch3 or xorg-server and 1.2.2-2.etch1 of libxfont.

For the oldstable distribution (etch), this problem has been fixed in
version 4.3.0.dfsg.1-14sarge6 of xfree86.

We recommend that you upgrade your libxfont abd xorg-server packages.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.



Debian 4.0 (stable)
- -------------------

Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/x/xorg-server/xorg-server_1.1.1.orig.tar.gz
    Size/MD5 checksum:  8388609 15852049050e49f380f953d8715500b9
  http://security.debian.org/pool/updates/main/x/xorg-server/xorg-server_1.1.1-21etch3.dsc
    Size/MD5 checksum:     1989 119b43cf5228da9ad961872deb2d0c9d
  http://security.debian.org/pool/updates/main/x/xorg-server/xorg-server_1.1.1-21etch3.diff.gz
    Size/MD5 checksum:   628625 9c0630bfcbb71de0dfea84e68ac456bb

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch3_alpha.deb
    Size/MD5 checksum:  4454468 60f2b9ad7ae4566d510b6c0b50204362
  http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch3_alpha.deb
    Size/MD5 checksum:   352750 b0e52131018b7285e4c114bfa016e9f9
  http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch3_alpha.deb
    Size/MD5 checksum:  1763170 dd54b9946db4631ada943eee0364c925
  http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch3_alpha.deb
    Size/MD5 checksum:  1929118 5ec9778017b27ab173e2251938b61220
  http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch3_alpha.deb
    Size/MD5 checksum:  1029150 966b29289f512ef793d203ed31262ee4
  http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch3_alpha.deb
    Size/MD5 checksum:   137042 7e22737acb2aa983b069b814feb7b81e
  http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch3_alpha.deb
    Size/MD5 checksum:  1961118 e9f4270dbcf83c911d59352efa2a1908

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch3_amd64.deb
    Size/MD5 checksum:  1653614 d3cda50e7c554cd016993cc841c71d75
  http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch3_amd64.deb
    Size/MD5 checksum:  1472080 418d9f792aa9adfe914f157a45825222
  http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch3_amd64.deb
    Size/MD5 checksum:  1622416 3e40f3065f4ba487d1a08e0ccaa065d0
  http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch3_amd64.deb
    Size/MD5 checksum:   350678 48a83d1eb1a695c9352b6c628713d9b8
  http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch3_amd64.deb
    Size/MD5 checksum:   133718 f9b35dc0bcce4c2ae91f90cb4f93bb9e
  http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch3_amd64.deb
    Size/MD5 checksum:  3918472 8431290ddf457274980a211191903024
  http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch3_amd64.deb
    Size/MD5 checksum:   859466 ea9b9091c11d6054e56d4f913def0d55

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch3_hppa.deb
    Size/MD5 checksum:   909802 b21c1f8de6dc4807206b39cba0e91220
  http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch3_hppa.deb
    Size/MD5 checksum:  4384724 4cbae98cae61b969e55ba5c37357f663
  http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch3_hppa.deb
    Size/MD5 checksum:   131256 033a1de1ae8814a9426837a73f48e583
  http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch3_hppa.deb
    Size/MD5 checksum:  1851644 be73a338931d6fa4c90303a1b648f399
  http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch3_hppa.deb
    Size/MD5 checksum:  1819784 a0af7f9fa8e9047f286c88f74120c1f9
  http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch3_hppa.deb
    Size/MD5 checksum:   345320 8ac5a0dbaa98a5f82ce261d5ca91f767
  http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch3_hppa.deb
    Size/MD5 checksum:  1659928 8eada093e360830443db1edebdead01e

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch3_i386.deb
    Size/MD5 checksum:  1563004 69f6360fb08efaad149162ce9a778897
  http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch3_i386.deb
    Size/MD5 checksum:  3654526 71dfc82c68f371d2896dca3398bfa5a9
  http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch3_i386.deb
    Size/MD5 checksum:  1537800 e09d61914b5ba848fe0c3836096ca047
  http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch3_i386.deb
    Size/MD5 checksum:   121584 399cc7a3f9a8f804ab8513b32954ed18
  http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch3_i386.deb
    Size/MD5 checksum:   345290 33f9335e9d5ee15e2b75c039e6bee60f
  http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch3_i386.deb
    Size/MD5 checksum:   807980 d792de8900e686ac39bde7a3ab2b74fc
  http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch3_i386.deb
    Size/MD5 checksum:  1388142 cb3c394b77f895cc988ef371ad6f5631

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch3_ia64.deb
    Size/MD5 checksum:  1306300 3bb166a30d0d069b04c2ebd513b82b97
  http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch3_ia64.deb
    Size/MD5 checksum:   161446 d26106fc6fe4af224d9b8df24240dc82
  http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch3_ia64.deb
    Size/MD5 checksum:   345268 ab2bbc074e5a5ffeb6bc6f323960bd0d
  http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch3_ia64.deb
    Size/MD5 checksum:  2220124 b4f01efed9b68ab50ba7e988e3e71678
  http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch3_ia64.deb
    Size/MD5 checksum:  2448078 cdd739a53011c833d963516857e296f7
  http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch3_ia64.deb
    Size/MD5 checksum:  5491246 3e58ff551a8d468572324cc72de4970f
  http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch3_ia64.deb
    Size/MD5 checksum:  2496210 dfc8bf018f2feef8489b0f68944ac400

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch3_mips.deb
    Size/MD5 checksum:  1536954 9d4cab19fe0c9e74aa54bbba89019134
  http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch3_mips.deb
    Size/MD5 checksum:  3827444 55bc181d66441e1f3a2060ef1f710336
  http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch3_mips.deb
    Size/MD5 checksum:  1682048 287625ffab364f59e9fc6b195e5a77ea
  http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch3_mips.deb
    Size/MD5 checksum:   862018 888827ac92b7e3b64be2e282d96c89f8
  http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch3_mips.deb
    Size/MD5 checksum:   134500 87ea99dba65c9ce99ae4980fc9f7e46c
  http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch3_mips.deb
    Size/MD5 checksum:  1714804 6a6667ff271d4c484504d65605d51bae
  http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch3_mips.deb
    Size/MD5 checksum:   345334 85bc6af2bdeb7a23d6e5aecff5d4cc37

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch3_mipsel.deb
    Size/MD5 checksum:   345368 7a958b0f22afd9871f6446bba4b3cf51
  http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch3_mipsel.deb
    Size/MD5 checksum:  1708774 33ce39e063c99fffb62a109e893bf931
  http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch3_mipsel.deb
    Size/MD5 checksum:  1674422 963fce8b933bb7f263d316385944251d
  http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch3_mipsel.deb
    Size/MD5 checksum:  1528380 f3d43ecd546e19c29b374a947f913079
  http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch3_mipsel.deb
    Size/MD5 checksum:  3710574 b8e618cd02cd73f1f53d03528c55d4ca
  http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch3_mipsel.deb
    Size/MD5 checksum:   134708 3754fea84213a6a114e0cae629ddc633
  http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch3_mipsel.deb
    Size/MD5 checksum:   862086 59564b2d93e31dd1e9fc03f93d9ef714

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch3_powerpc.deb
    Size/MD5 checksum:  1448230 1e6faf8eae4917726ea7663f34d220f9
  http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch3_powerpc.deb
    Size/MD5 checksum:  1587198 13581984ebc724c169ffe0b9300d65dc
  http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch3_powerpc.deb
    Size/MD5 checksum:   345356 52752d72eacbeaa1d9d3ec89e4863c86
  http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch3_powerpc.deb
    Size/MD5 checksum:   842324 0ae4dbac3f72004a88110017cf3c5eed
  http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch3_powerpc.deb
    Size/MD5 checksum:  1612102 7120d310a9901aead6849c1a7ca950c1
  http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch3_powerpc.deb
    Size/MD5 checksum:  3983080 f9ea8fa75a5584200a9d3617dc99902b
  http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch3_powerpc.deb
    Size/MD5 checksum:   136746 ce9d3866a4f1ae384c76371143c9624d

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch3_s390.deb
    Size/MD5 checksum:   884868 4fb034b61177acb516d4f4096849d9fa
  http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch3_s390.deb
    Size/MD5 checksum:   345250 a8bea7bf8c643fadff197f7121d27b06
  http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch3_s390.deb
    Size/MD5 checksum:  1566278 bceff0a927797661f5b4a0c755e19475
  http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch3_s390.deb
    Size/MD5 checksum:  1709626 9b9344efb4f95676404b39b4613c1841
  http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch3_s390.deb
    Size/MD5 checksum:   130492 617803f3b3e9e9854ff850efb834bb37
  http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch3_s390.deb
    Size/MD5 checksum:  4132406 36921a15aa88e2c33552425ff7b408e4
  http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch3_s390.deb
    Size/MD5 checksum:  1740222 5d39b517eaa72af8e89521a240acbaf9

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch3_sparc.deb
    Size/MD5 checksum:  1548492 6226fe67b76f3b53c1eefeb5ae6d1dd4
  http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch3_sparc.deb
    Size/MD5 checksum:  1524274 84a62d94a293a95a5a8a720a90553f38
  http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch3_sparc.deb
    Size/MD5 checksum:  1391724 8d3951e962c0d9cb4eac8f44f1668d48
  http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch3_sparc.deb
    Size/MD5 checksum:   119832 d7808d2f3ad69513af621c24a64864a5
  http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch3_sparc.deb
    Size/MD5 checksum:  3697578 45501c7fc690f8130f2cccd97014a3ca
  http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch3_sparc.deb
    Size/MD5 checksum:   779216 bcceda76a9461e9a6633513c46fd3365
  http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch3_sparc.deb
    Size/MD5 checksum:   345748 2eccbc2e531b57c15fecad72f3ff44ac

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHkfZoXm3vHE4uyloRAopdAKCzog+oIcAITPAM0DGgfkxUbPSBvwCgqt1u
9LoePlEOKhofcbdWoAXvRik=
=+5Gd
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ