Vulnerability CVE-2017-12176: Information

Description

xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.

Severity: CRITICAL (9.8) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Published: Jan. 24, 2018
Modified: Oct. 10, 2019
Error type identifier: CWE-20

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
xorg-serversisyphus1.19.5-alt121.1.13-alt1ALT-PU-2017-2438-1190874Fixed
xorg-serverp101.19.5-alt11.20.14-alt12ALT-PU-2017-2438-1190874Fixed
xorg-serverp91.19.5-alt11.20.8-alt12ALT-PU-2017-2438-1190874Fixed
xorg-serverp81.18.4-alt1.M80P.61.19.7-alt0.M80P.1ALT-PU-2017-2439-1190873Fixed
xorg-serverc10f11.19.5-alt11.20.14-alt12ALT-PU-2017-2438-1190874Fixed
xorg-serverc9f21.19.5-alt11.20.8-alt12ALT-PU-2017-2438-1190874Fixed
xorg-serverc71.14.5-alt3.M70C.41.14.5-alt3.M70C.4ALT-PU-2017-2473-1191181Fixed

References to Advisories, Solutions, and Tools

Hyperlink
Resource
https://cgit.freedesktop.org/xorg/xserver/commit/?id=b747da5e25be944337a9cd1415506fc06b70aa81
  • Patch
  • Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1509214
  • Issue Tracking
  • Patch
  • Third Party Advisory
  • VDB Entry
DSA-4000
  • Third Party Advisory
GLSA-201711-05
  • Third Party Advisory
  • VDB Entry
[debian-lts-announce] 20171122 [SECURITY] [DLA 1186-1] xorg-server security update
  • Mailing List
  • Third Party Advisory
    1. Configuration 1

      cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

      cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

      Configuration 2

      cpe:2.3:a:x.org:xorg-server:*:*:*:*:*:*:*:*
      End excliding
      1.19.5