Ubuntu 1232-3: X.Org X server vulnerability

    Date20 Oct 2011
    CategoryUbuntu
    49
    Posted ByLinuxSecurity Advisories
    The X server could be made to crash or run programs as an administrator.
    ==========================================================================
    Ubuntu Security Notice USN-1232-3
    October 20, 2011
    
    xorg-server vulnerability
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 10.10
    - Ubuntu 10.04 LTS
    
    Summary:
    
    The X server could be made to crash or run programs as an administrator.
    
    Software Description:
    - xorg-server: X.Org X server
    
    Details:
    
    USN-1232-1 fixed vulnerabilities in the X.Org X server. A regression was
    found on Ubuntu 10.04 LTS that affected GLX support, and USN-1232-2 was
    released to temporarily disable the problematic security fix. This update
    includes a revised fix for CVE-2010-4818.
    
    We apologize for the inconvenience.
    
    Original advisory details:
    
     It was discovered that the X server incorrectly handled certain malformed
     input. An authorized attacker could exploit this to cause the X server to
     crash, leading to a denial or service, or possibly execute arbitrary code
     with root privileges. This issue only affected Ubuntu 10.04 LTS and 10.10.
     (CVE-2010-4818)
     
     It was discovered that the X server incorrectly handled certain malformed
     input. An authorized attacker could exploit this to cause the X server to
     crash, leading to a denial or service, or possibly read arbitrary data from
     the X server process. This issue only affected Ubuntu 10.04 LTS.
     (CVE-2010-4819)
     
     Vladz discovered that the X server incorrectly handled lock files. A local
     attacker could use this flaw to determine if a file existed or not.
     (CVE-2011-4028)
     
     Vladz discovered that the X server incorrectly handled setting lock file
     permissions. A local attacker could use this flaw to gain read permissions
     on arbitrary files and view sensitive information. (CVE-2011-4029)
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 10.10:
      xserver-xorg-core               2:1.9.0-0ubuntu7.6
    
    Ubuntu 10.04 LTS:
      xserver-xorg-core               2:1.7.6-2ubuntu7.10
    
    After a standard system update you need to restart your session to make
    all the necessary changes.
    
    References:
      http://www.ubuntu.com/usn/usn-1232-3
      http://www.ubuntu.com/usn/usn-1232-1
      CVE-2010-4818
    
    Package Information:
      https://launchpad.net/ubuntu/+source/xorg-server/2:1.9.0-0ubuntu7.6
      https://launchpad.net/ubuntu/+source/xorg-server/2:1.7.6-2ubuntu7.10
    
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"64","type":"x","order":"1","pct":57.14,"resources":[]},{"id":"88","title":"Should be more technical","votes":"15","type":"x","order":"2","pct":13.39,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"33","type":"x","order":"3","pct":29.46,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.