-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ Debian Security Advisory DSA-1466-2 security@xxxxxxxxxx http://www.debian.org/security/ Moritz Muehlenhoff January 19, 2008 http://www.debian.org/security/faq - ------------------------------------------------------------------------ Package : xorg-server, libxfont, xfree86 Vulnerability : several Problem type : local Debian-specific: no CVE Id(s) : CVE-2007-5760 CVE-2007-5958 CVE-2007-6427 CVE-2007-6428 CVE-2007-6429 CVE-2008-0006 The X.org fix for CVE-2007-6429 introduced a regression in the MIT-SHM extension, which prevented the start of a few applications. This update fixes this problem and also references the patch for CVE-2008-0006, which was included in the previous update, but not mentioned in the advisory text. Several local vulnerabilities have been discovered in the X.Org X server. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-5760 "regenrecht" discovered that missing input sanitising within the XFree86-Misc extension may lead to local privilege escalation. CVE-2007-5958 It was discovered that error messages of security policy file handling may lead to a minor information leak disclosing the existance of files otherwise unaccessible to the user. CVE-2007-6427 "regenrecht" discovered that missing input sanitising within the XInput-Misc extension may lead to local privilege escalation. CVE-2007-6428 "regenrecht" discovered that missing input sanitising within the TOG-CUP extension may lead to disclosure of memory contents. CVE-2007-6429 "regenrecht" discovered that integer overflows in the EVI and MIT-SHM extensions may lead to local privilege escalation. CVE-2008-0006 It was discovered that insufficient validation of PCF fonts could lead to local privilege escalation. For the unstable distribution (sid), this problem has been fixed in version 2:1.4.1~git20080118-1 of xorg-server and version 1:1.3.1-2 of libxfont. For the stable distribution (etch), this problem has been fixed in version 1.1.1-21etch3 or xorg-server and 1.2.2-2.etch1 of libxfont. For the oldstable distribution (etch), this problem has been fixed in version 4.3.0.dfsg.1-14sarge6 of xfree86. We recommend that you upgrade your libxfont abd xorg-server packages. Upgrade instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian 4.0 (stable) - ------------------- Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: http://security.debian.org/pool/updates/main/x/xorg-server/xorg-server_1.1.1.orig.tar.gz Size/MD5 checksum: 8388609 15852049050e49f380f953d8715500b9 http://security.debian.org/pool/updates/main/x/xorg-server/xorg-server_1.1.1-21etch3.dsc Size/MD5 checksum: 1989 119b43cf5228da9ad961872deb2d0c9d http://security.debian.org/pool/updates/main/x/xorg-server/xorg-server_1.1.1-21etch3.diff.gz Size/MD5 checksum: 628625 9c0630bfcbb71de0dfea84e68ac456bb alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch3_alpha.deb Size/MD5 checksum: 4454468 60f2b9ad7ae4566d510b6c0b50204362 http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch3_alpha.deb Size/MD5 checksum: 352750 b0e52131018b7285e4c114bfa016e9f9 http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch3_alpha.deb Size/MD5 checksum: 1763170 dd54b9946db4631ada943eee0364c925 http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch3_alpha.deb Size/MD5 checksum: 1929118 5ec9778017b27ab173e2251938b61220 http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch3_alpha.deb Size/MD5 checksum: 1029150 966b29289f512ef793d203ed31262ee4 http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch3_alpha.deb Size/MD5 checksum: 137042 7e22737acb2aa983b069b814feb7b81e http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch3_alpha.deb Size/MD5 checksum: 1961118 e9f4270dbcf83c911d59352efa2a1908 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch3_amd64.deb Size/MD5 checksum: 1653614 d3cda50e7c554cd016993cc841c71d75 http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch3_amd64.deb Size/MD5 checksum: 1472080 418d9f792aa9adfe914f157a45825222 http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch3_amd64.deb Size/MD5 checksum: 1622416 3e40f3065f4ba487d1a08e0ccaa065d0 http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch3_amd64.deb Size/MD5 checksum: 350678 48a83d1eb1a695c9352b6c628713d9b8 http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch3_amd64.deb Size/MD5 checksum: 133718 f9b35dc0bcce4c2ae91f90cb4f93bb9e http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch3_amd64.deb Size/MD5 checksum: 3918472 8431290ddf457274980a211191903024 http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch3_amd64.deb Size/MD5 checksum: 859466 ea9b9091c11d6054e56d4f913def0d55 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch3_hppa.deb Size/MD5 checksum: 909802 b21c1f8de6dc4807206b39cba0e91220 http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch3_hppa.deb Size/MD5 checksum: 4384724 4cbae98cae61b969e55ba5c37357f663 http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch3_hppa.deb Size/MD5 checksum: 131256 033a1de1ae8814a9426837a73f48e583 http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch3_hppa.deb Size/MD5 checksum: 1851644 be73a338931d6fa4c90303a1b648f399 http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch3_hppa.deb Size/MD5 checksum: 1819784 a0af7f9fa8e9047f286c88f74120c1f9 http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch3_hppa.deb Size/MD5 checksum: 345320 8ac5a0dbaa98a5f82ce261d5ca91f767 http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch3_hppa.deb Size/MD5 checksum: 1659928 8eada093e360830443db1edebdead01e i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch3_i386.deb Size/MD5 checksum: 1563004 69f6360fb08efaad149162ce9a778897 http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch3_i386.deb Size/MD5 checksum: 3654526 71dfc82c68f371d2896dca3398bfa5a9 http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch3_i386.deb Size/MD5 checksum: 1537800 e09d61914b5ba848fe0c3836096ca047 http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch3_i386.deb Size/MD5 checksum: 121584 399cc7a3f9a8f804ab8513b32954ed18 http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch3_i386.deb Size/MD5 checksum: 345290 33f9335e9d5ee15e2b75c039e6bee60f http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch3_i386.deb Size/MD5 checksum: 807980 d792de8900e686ac39bde7a3ab2b74fc http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch3_i386.deb Size/MD5 checksum: 1388142 cb3c394b77f895cc988ef371ad6f5631 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch3_ia64.deb Size/MD5 checksum: 1306300 3bb166a30d0d069b04c2ebd513b82b97 http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch3_ia64.deb Size/MD5 checksum: 161446 d26106fc6fe4af224d9b8df24240dc82 http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch3_ia64.deb Size/MD5 checksum: 345268 ab2bbc074e5a5ffeb6bc6f323960bd0d http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch3_ia64.deb Size/MD5 checksum: 2220124 b4f01efed9b68ab50ba7e988e3e71678 http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch3_ia64.deb Size/MD5 checksum: 2448078 cdd739a53011c833d963516857e296f7 http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch3_ia64.deb Size/MD5 checksum: 5491246 3e58ff551a8d468572324cc72de4970f http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch3_ia64.deb Size/MD5 checksum: 2496210 dfc8bf018f2feef8489b0f68944ac400 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch3_mips.deb Size/MD5 checksum: 1536954 9d4cab19fe0c9e74aa54bbba89019134 http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch3_mips.deb Size/MD5 checksum: 3827444 55bc181d66441e1f3a2060ef1f710336 http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch3_mips.deb Size/MD5 checksum: 1682048 287625ffab364f59e9fc6b195e5a77ea http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch3_mips.deb Size/MD5 checksum: 862018 888827ac92b7e3b64be2e282d96c89f8 http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch3_mips.deb Size/MD5 checksum: 134500 87ea99dba65c9ce99ae4980fc9f7e46c http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch3_mips.deb Size/MD5 checksum: 1714804 6a6667ff271d4c484504d65605d51bae http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch3_mips.deb Size/MD5 checksum: 345334 85bc6af2bdeb7a23d6e5aecff5d4cc37 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch3_mipsel.deb Size/MD5 checksum: 345368 7a958b0f22afd9871f6446bba4b3cf51 http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch3_mipsel.deb Size/MD5 checksum: 1708774 33ce39e063c99fffb62a109e893bf931 http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch3_mipsel.deb Size/MD5 checksum: 1674422 963fce8b933bb7f263d316385944251d http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch3_mipsel.deb Size/MD5 checksum: 1528380 f3d43ecd546e19c29b374a947f913079 http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch3_mipsel.deb Size/MD5 checksum: 3710574 b8e618cd02cd73f1f53d03528c55d4ca http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch3_mipsel.deb Size/MD5 checksum: 134708 3754fea84213a6a114e0cae629ddc633 http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch3_mipsel.deb Size/MD5 checksum: 862086 59564b2d93e31dd1e9fc03f93d9ef714 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch3_powerpc.deb Size/MD5 checksum: 1448230 1e6faf8eae4917726ea7663f34d220f9 http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch3_powerpc.deb Size/MD5 checksum: 1587198 13581984ebc724c169ffe0b9300d65dc http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch3_powerpc.deb Size/MD5 checksum: 345356 52752d72eacbeaa1d9d3ec89e4863c86 http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch3_powerpc.deb Size/MD5 checksum: 842324 0ae4dbac3f72004a88110017cf3c5eed http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch3_powerpc.deb Size/MD5 checksum: 1612102 7120d310a9901aead6849c1a7ca950c1 http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch3_powerpc.deb Size/MD5 checksum: 3983080 f9ea8fa75a5584200a9d3617dc99902b http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch3_powerpc.deb Size/MD5 checksum: 136746 ce9d3866a4f1ae384c76371143c9624d s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch3_s390.deb Size/MD5 checksum: 884868 4fb034b61177acb516d4f4096849d9fa http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch3_s390.deb Size/MD5 checksum: 345250 a8bea7bf8c643fadff197f7121d27b06 http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch3_s390.deb Size/MD5 checksum: 1566278 bceff0a927797661f5b4a0c755e19475 http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch3_s390.deb Size/MD5 checksum: 1709626 9b9344efb4f95676404b39b4613c1841 http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch3_s390.deb Size/MD5 checksum: 130492 617803f3b3e9e9854ff850efb834bb37 http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch3_s390.deb Size/MD5 checksum: 4132406 36921a15aa88e2c33552425ff7b408e4 http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch3_s390.deb Size/MD5 checksum: 1740222 5d39b517eaa72af8e89521a240acbaf9 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch3_sparc.deb Size/MD5 checksum: 1548492 6226fe67b76f3b53c1eefeb5ae6d1dd4 http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch3_sparc.deb Size/MD5 checksum: 1524274 84a62d94a293a95a5a8a720a90553f38 http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch3_sparc.deb Size/MD5 checksum: 1391724 8d3951e962c0d9cb4eac8f44f1668d48 http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch3_sparc.deb Size/MD5 checksum: 119832 d7808d2f3ad69513af621c24a64864a5 http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch3_sparc.deb Size/MD5 checksum: 3697578 45501c7fc690f8130f2cccd97014a3ca http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch3_sparc.deb Size/MD5 checksum: 779216 bcceda76a9461e9a6633513c46fd3365 http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch3_sparc.deb Size/MD5 checksum: 345748 2eccbc2e531b57c15fecad72f3ff44ac These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFHkfZoXm3vHE4uyloRAopdAKCzog+oIcAITPAM0DGgfkxUbPSBvwCgqt1u 9LoePlEOKhofcbdWoAXvRik= =+5Gd -----END PGP SIGNATURE-----