Ubuntu 1232-1: X.Org X server vulnerabilities

    Date18 Oct 2011
    CategoryUbuntu
    82
    Posted ByLinuxSecurity Advisories
    The X server could be made to crash, run programs as an administrator, or read arbitrary files.
    ==========================================================================
    Ubuntu Security Notice USN-1232-1
    October 18, 2011
    
    xorg-server vulnerabilities
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 11.10
    - Ubuntu 11.04
    - Ubuntu 10.10
    - Ubuntu 10.04 LTS
    
    Summary:
    
    The X server could be made to crash, run programs as an administrator, or
    read arbitrary files.
    
    Software Description:
    - xorg-server: X.Org X server
    
    Details:
    
    It was discovered that the X server incorrectly handled certain malformed
    input. An authorized attacker could exploit this to cause the X server to
    crash, leading to a denial or service, or possibly execute arbitrary code
    with root privileges. This issue only affected Ubuntu 10.04 LTS and 10.10.
    (CVE-2010-4818)
    
    It was discovered that the X server incorrectly handled certain malformed
    input. An authorized attacker could exploit this to cause the X server to
    crash, leading to a denial or service, or possibly read arbitrary data from
    the X server process. This issue only affected Ubuntu 10.04 LTS.
    (CVE-2010-4819)
    
    Vladz discovered that the X server incorrectly handled lock files. A local
    attacker could use this flaw to determine if a file existed or not.
    (CVE-2011-4028)
    
    Vladz discovered that the X server incorrectly handled setting lock file
    permissions. A local attacker could use this flaw to gain read permissions
    on arbitrary files and view sensitive information. (CVE-2011-4029)
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 11.10:
      xserver-xorg-core               2:1.10.4-1ubuntu4.1
    
    Ubuntu 11.04:
      xserver-xorg-core               2:1.10.1-1ubuntu1.3
    
    Ubuntu 10.10:
      xserver-xorg-core               2:1.9.0-0ubuntu7.5
    
    Ubuntu 10.04 LTS:
      xserver-xorg-core               2:1.7.6-2ubuntu7.8
    
    After a standard system update you need to restart your session to make
    all the necessary changes.
    
    References:
      http://www.ubuntu.com/usn/usn-1232-1
      CVE-2010-4818, CVE-2010-4819, CVE-2011-4028, CVE-2011-4029
    
    Package Information:
      https://launchpad.net/ubuntu/+source/xorg-server/2:1.10.4-1ubuntu4.1
      https://launchpad.net/ubuntu/+source/xorg-server/2:1.10.1-1ubuntu1.3
      https://launchpad.net/ubuntu/+source/xorg-server/2:1.9.0-0ubuntu7.5
      https://launchpad.net/ubuntu/+source/xorg-server/2:1.7.6-2ubuntu7.8
    
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"40","type":"x","order":"1","pct":48.78,"resources":[]},{"id":"88","title":"Should be more technical","votes":"13","type":"x","order":"2","pct":15.85,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"29","type":"x","order":"3","pct":35.37,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.