You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa X.Org X server

Sigurnosni nedostaci programskog paketa X.Org X server

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-3453-1
October 12, 2017

xorg-server, xorg-server-hwe-16.04, xorg-server-lts-xenial vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 17.04
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in the X.Org X server.

Software Description:
– xorg-server: X.Org X11 server
– xorg-server-hwe-16.04: X.Org X11 server
– xorg-server-lts-xenial: X.Org X11 server

Details:

Michal Srb discovered that the X.Org X server incorrectly handled shared
memory segments. An attacker able to connect to an X server, either locally
or remotely, could use this issue to crash the server, or possibly replace
shared memory segments of other X clients in the same session.
(CVE-2017-13721)

Michal Srb discovered that the X.Org X server incorrectly handled XKB
buffers. An attacker able to connect to an X server, either locally or
remotely, could use this issue to crash the server, or possibly execute
arbitrary code. (CVE-2017-13723)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.04:
xserver-xorg-core 2:1.19.3-1ubuntu1.2

Ubuntu 16.04 LTS:
xserver-xorg-core 2:1.18.4-0ubuntu0.6
xserver-xorg-core-hwe-16.04 2:1.19.3-1ubuntu1~16.04.3

Ubuntu 14.04 LTS:
xserver-xorg-core 2:1.15.1-0ubuntu2.10
xserver-xorg-core-lts-xenial 2:1.18.3-1ubuntu2.3~trusty3

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
https://www.ubuntu.com/usn/usn-3453-1
CVE-2017-13721, CVE-2017-13723

Package Information:
https://launchpad.net/ubuntu/+source/xorg-server/2:1.19.3-1ubuntu1.2
https://launchpad.net/ubuntu/+source/xorg-server/2:1.18.4-0ubuntu0.6

https://launchpad.net/ubuntu/+source/xorg-server-hwe-16.04/2:1.19.3-1ubuntu1~16.04.3
https://launchpad.net/ubuntu/+source/xorg-server/2:1.15.1-0ubuntu2.10

https://launchpad.net/ubuntu/+source/xorg-server-lts-xenial/2:1.18.3-1ubuntu2.3~trusty3

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=+6GJ
—–END PGP SIGNATURE—–

AutorDanijel Kozinovic
Cert idNCERT-REF-2017-10-0095-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa rh-mysql57-mysql

Otkriveni su sigurnosni nedostaci u programskom paketu rh-mysql57-mysql za operacijski sustav RHEL. Otkriveni nedostaci potencijalnim napadačima omogućuju rušenje mysqld daemona,...

Close