Linux Security
Linux Security
Linux Security

Debian: New xorg-server packages fix regression

Date 19 Jan 2008
Posted By LinuxSecurity Advisories
Ulf Harnhammer discovered that the HTML filter of the Horde web application framework performed insufficient input sanitising, which may lead to the deletion of emails if a user is tricked into viewing a malformed email inside the Imp client.
- ------------------------------------------------------------------------
Debian Security Advisory DSA-1466-2                  This email address is being protected from spambots. You need JavaScript enabled to view it.                       Moritz Muehlenhoff
January 19, 2008            
- ------------------------------------------------------------------------

Package        : xorg-server, libxfont, xfree86
Vulnerability  : several
Problem type   : local
Debian-specific: no
CVE Id(s)      : CVE-2007-5760 CVE-2007-5958 CVE-2007-6427 CVE-2007-6428 CVE-2007-6429 CVE-2008-0006

The fix for CVE-2007-6429 introduced a regression in the MIT-SHM
extension, which prevented the start of a few applications. This update
fixes this problem and also references the patch for CVE-2008-0006,
which was included in the previous update, but not mentioned in the
advisory text.

Several local vulnerabilities have been discovered in the X.Org X
server. The Common Vulnerabilities and Exposures project identifies the
following problems:


    "regenrecht" discovered that missing input sanitising within
    the XFree86-Misc extension may lead to local privilege escalation.


    It was discovered that error messages of security policy file
    handling may lead to a minor information leak disclosing the
    existance of files otherwise unaccessible to the user.


    "regenrecht" discovered that missing input sanitising within
    the XInput-Misc extension may lead to local privilege escalation.


    "regenrecht" discovered that missing input sanitising within
    the TOG-CUP extension may lead to disclosure of memory contents.


    "regenrecht" discovered that integer overflows in the EVI
    and MIT-SHM extensions may lead to local privilege escalation.


   It was discovered that insufficient validation of PCF fonts could lead
   to local privilege escalation.

For the unstable distribution (sid), this problem has been fixed in
version 2:1.4.1~git20080118-1 of xorg-server and version 1:1.3.1-2
of libxfont.

For the stable distribution (etch), this problem has been fixed in
version 1.1.1-21etch3 or xorg-server and 1.2.2-2.etch1 of libxfont.

For the oldstable distribution (etch), this problem has been fixed in
version 4.3.0.dfsg.1-14sarge6 of xfree86.

We recommend that you upgrade your libxfont abd xorg-server packages.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian 4.0 (stable)
- -------------------

Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:
    Size/MD5 checksum:  8388609 15852049050e49f380f953d8715500b9
    Size/MD5 checksum:     1989 119b43cf5228da9ad961872deb2d0c9d
    Size/MD5 checksum:   628625 9c0630bfcbb71de0dfea84e68ac456bb

alpha architecture (DEC Alpha)
    Size/MD5 checksum:  4454468 60f2b9ad7ae4566d510b6c0b50204362
    Size/MD5 checksum:   352750 b0e52131018b7285e4c114bfa016e9f9
    Size/MD5 checksum:  1763170 dd54b9946db4631ada943eee0364c925
    Size/MD5 checksum:  1929118 5ec9778017b27ab173e2251938b61220
    Size/MD5 checksum:  1029150 966b29289f512ef793d203ed31262ee4
    Size/MD5 checksum:   137042 7e22737acb2aa983b069b814feb7b81e
    Size/MD5 checksum:  1961118 e9f4270dbcf83c911d59352efa2a1908

amd64 architecture (AMD x86_64 (AMD64))
    Size/MD5 checksum:  1653614 d3cda50e7c554cd016993cc841c71d75
    Size/MD5 checksum:  1472080 418d9f792aa9adfe914f157a45825222
    Size/MD5 checksum:  1622416 3e40f3065f4ba487d1a08e0ccaa065d0
    Size/MD5 checksum:   350678 48a83d1eb1a695c9352b6c628713d9b8
    Size/MD5 checksum:   133718 f9b35dc0bcce4c2ae91f90cb4f93bb9e
    Size/MD5 checksum:  3918472 8431290ddf457274980a211191903024
    Size/MD5 checksum:   859466 ea9b9091c11d6054e56d4f913def0d55

hppa architecture (HP PA RISC)
    Size/MD5 checksum:   909802 b21c1f8de6dc4807206b39cba0e91220
    Size/MD5 checksum:  4384724 4cbae98cae61b969e55ba5c37357f663
    Size/MD5 checksum:   131256 033a1de1ae8814a9426837a73f48e583
    Size/MD5 checksum:  1851644 be73a338931d6fa4c90303a1b648f399
    Size/MD5 checksum:  1819784 a0af7f9fa8e9047f286c88f74120c1f9
    Size/MD5 checksum:   345320 8ac5a0dbaa98a5f82ce261d5ca91f767
    Size/MD5 checksum:  1659928 8eada093e360830443db1edebdead01e

i386 architecture (Intel ia32)
    Size/MD5 checksum:  1563004 69f6360fb08efaad149162ce9a778897
    Size/MD5 checksum:  3654526 71dfc82c68f371d2896dca3398bfa5a9
    Size/MD5 checksum:  1537800 e09d61914b5ba848fe0c3836096ca047
    Size/MD5 checksum:   121584 399cc7a3f9a8f804ab8513b32954ed18
    Size/MD5 checksum:   345290 33f9335e9d5ee15e2b75c039e6bee60f
    Size/MD5 checksum:   807980 d792de8900e686ac39bde7a3ab2b74fc
    Size/MD5 checksum:  1388142 cb3c394b77f895cc988ef371ad6f5631

ia64 architecture (Intel ia64)
    Size/MD5 checksum:  1306300 3bb166a30d0d069b04c2ebd513b82b97
    Size/MD5 checksum:   161446 d26106fc6fe4af224d9b8df24240dc82
    Size/MD5 checksum:   345268 ab2bbc074e5a5ffeb6bc6f323960bd0d
    Size/MD5 checksum:  2220124 b4f01efed9b68ab50ba7e988e3e71678
    Size/MD5 checksum:  2448078 cdd739a53011c833d963516857e296f7
    Size/MD5 checksum:  5491246 3e58ff551a8d468572324cc72de4970f
    Size/MD5 checksum:  2496210 dfc8bf018f2feef8489b0f68944ac400

mips architecture (MIPS (Big Endian))
    Size/MD5 checksum:  1536954 9d4cab19fe0c9e74aa54bbba89019134
    Size/MD5 checksum:  3827444 55bc181d66441e1f3a2060ef1f710336
    Size/MD5 checksum:  1682048 287625ffab364f59e9fc6b195e5a77ea
    Size/MD5 checksum:   862018 888827ac92b7e3b64be2e282d96c89f8
    Size/MD5 checksum:   134500 87ea99dba65c9ce99ae4980fc9f7e46c
    Size/MD5 checksum:  1714804 6a6667ff271d4c484504d65605d51bae
    Size/MD5 checksum:   345334 85bc6af2bdeb7a23d6e5aecff5d4cc37

mipsel architecture (MIPS (Little Endian))
    Size/MD5 checksum:   345368 7a958b0f22afd9871f6446bba4b3cf51
    Size/MD5 checksum:  1708774 33ce39e063c99fffb62a109e893bf931
    Size/MD5 checksum:  1674422 963fce8b933bb7f263d316385944251d
    Size/MD5 checksum:  1528380 f3d43ecd546e19c29b374a947f913079
    Size/MD5 checksum:  3710574 b8e618cd02cd73f1f53d03528c55d4ca
    Size/MD5 checksum:   134708 3754fea84213a6a114e0cae629ddc633
    Size/MD5 checksum:   862086 59564b2d93e31dd1e9fc03f93d9ef714

powerpc architecture (PowerPC)
    Size/MD5 checksum:  1448230 1e6faf8eae4917726ea7663f34d220f9
    Size/MD5 checksum:  1587198 13581984ebc724c169ffe0b9300d65dc
    Size/MD5 checksum:   345356 52752d72eacbeaa1d9d3ec89e4863c86
    Size/MD5 checksum:   842324 0ae4dbac3f72004a88110017cf3c5eed
    Size/MD5 checksum:  1612102 7120d310a9901aead6849c1a7ca950c1
    Size/MD5 checksum:  3983080 f9ea8fa75a5584200a9d3617dc99902b
    Size/MD5 checksum:   136746 ce9d3866a4f1ae384c76371143c9624d

s390 architecture (IBM S/390)
    Size/MD5 checksum:   884868 4fb034b61177acb516d4f4096849d9fa
    Size/MD5 checksum:   345250 a8bea7bf8c643fadff197f7121d27b06
    Size/MD5 checksum:  1566278 bceff0a927797661f5b4a0c755e19475
    Size/MD5 checksum:  1709626 9b9344efb4f95676404b39b4613c1841
    Size/MD5 checksum:   130492 617803f3b3e9e9854ff850efb834bb37
    Size/MD5 checksum:  4132406 36921a15aa88e2c33552425ff7b408e4
    Size/MD5 checksum:  1740222 5d39b517eaa72af8e89521a240acbaf9

sparc architecture (Sun SPARC/UltraSPARC)
    Size/MD5 checksum:  1548492 6226fe67b76f3b53c1eefeb5ae6d1dd4
    Size/MD5 checksum:  1524274 84a62d94a293a95a5a8a720a90553f38
    Size/MD5 checksum:  1391724 8d3951e962c0d9cb4eac8f44f1668d48
    Size/MD5 checksum:   119832 d7808d2f3ad69513af621c24a64864a5
    Size/MD5 checksum:  3697578 45501c7fc690f8130f2cccd97014a3ca
    Size/MD5 checksum:   779216 bcceda76a9461e9a6633513c46fd3365
    Size/MD5 checksum:   345748 2eccbc2e531b57c15fecad72f3ff44ac

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.


LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"43","type":"x","order":"1","pct":81.13,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"5","type":"x","order":"2","pct":9.43,"resources":[]},{"id":"181","title":"Hardly ever","votes":"5","type":"x","order":"3","pct":9.43,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.



bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.