Important: xorg-x11-server security update

Synopsis

Important: xorg-x11-server security update

Type/Severity

Security Advisory: Important

Topic

Updated xorg-x11-server packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 5.

Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

Description

X.Org is an open source implementation of the X Window System. It provides
the basic low-level functionality that full-fledged graphical user
interfaces are designed upon.

Multiple integer overflow flaws and out-of-bounds write flaws were found in
the way the X.Org server calculated memory requirements for certain X11
core protocol and GLX extension requests. A malicious, authenticated client
could use either of these flaws to crash the X.Org server or, potentially,
execute arbitrary code with root privileges. (CVE-2014-8092, CVE-2014-8093,
CVE-2014-8098)

It was found that the X.Org server did not properly handle SUN-DES-1
(Secure RPC) authentication credentials. A malicious, unauthenticated
client could use this flaw to crash the X.Org server by submitting a
specially crafted authentication request. (CVE-2014-8091)

Multiple out-of-bounds access flaws were found in the way the X.Org server
calculated memory requirements for certain requests. A malicious,
authenticated client could use either of these flaws to crash the X.Org
server, or leak memory contents to the client. (CVE-2014-8097)

Multiple out-of-bounds access flaws were found in the way the X.Org server
calculated memory requirements for certain requests. A malicious,
authenticated client could use either of these flaws to crash the X.Org
server. (CVE-2014-8095, CVE-2014-8096, CVE-2014-8099, CVE-2014-8100,
CVE-2014-8101, CVE-2014-8102)

All xorg-x11-server users are advised to upgrade to these updated packages,
which contain backported patches to correct these issues.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 1168680 - CVE-2014-8091 xorg-x11-server: denial of service due to unchecked malloc in client authentication
  • BZ - 1168684 - CVE-2014-8092 xorg-x11-server: integer overflow in X11 core protocol requests when calculating memory needs for requests
  • BZ - 1168688 - CVE-2014-8093 xorg-x11-server: integer overflow in GLX extension requests when calculating memory needs for requests
  • BZ - 1168694 - CVE-2014-8095 xorg-x11-server: out of bounds access due to not validating length or offset values in XInput extension
  • BZ - 1168700 - CVE-2014-8096 xorg-x11-server: out of bounds access due to not validating length or offset values in XC-MISC extension
  • BZ - 1168705 - CVE-2014-8097 xorg-x11-server: out of bounds access due to not validating length or offset values in DBE extension
  • BZ - 1168707 - CVE-2014-8098 xorg-x11-server: out of bounds access due to not validating length or offset values in GLX extension
  • BZ - 1168710 - CVE-2014-8099 xorg-x11-server: out of bounds access due to not validating length or offset values in XVideo extension
  • BZ - 1168711 - CVE-2014-8100 xorg-x11-server: out of bounds access due to not validating length or offset values in Render extension
  • BZ - 1168713 - CVE-2014-8101 xorg-x11-server: out of bounds access due to not validating length or offset values in RandR extension
  • BZ - 1168714 - CVE-2014-8102 xorg-x11-server: out of bounds access due to not validating length or offset values in XFixes extension

CVEs

References