From owner-svn-ports-head@FreeBSD.ORG Wed Dec 10 21:31:57 2014 Return-Path: Delivered-To: svn-ports-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 8F63B1D9; Wed, 10 Dec 2014 21:31:57 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 7BA267EC; Wed, 10 Dec 2014 21:31:57 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id sBALVv6P028880; Wed, 10 Dec 2014 21:31:57 GMT (envelope-from kwm@FreeBSD.org) Received: (from kwm@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id sBALVv1H028878; Wed, 10 Dec 2014 21:31:57 GMT (envelope-from kwm@FreeBSD.org) Message-Id: <201412102131.sBALVv1H028878@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: kwm set sender to kwm@FreeBSD.org using -f From: Koop Mast Date: Wed, 10 Dec 2014 21:31:57 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r374488 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 10 Dec 2014 21:31:57 -0000 Author: kwm Date: Wed Dec 10 21:31:56 2014 New Revision: 374488 URL: https://svnweb.freebsd.org/changeset/ports/374488 QAT: https://qat.redports.org/buildarchive/r374488/ Log: Document xserver security advisories. Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Wed Dec 10 20:23:06 2014 (r374487) +++ head/security/vuxml/vuln.xml Wed Dec 10 21:31:56 2014 (r374488) @@ -57,6 +57,71 @@ Notes: --> + + xserver -- multiple issue with X client request handling + + + xorg-server + 1.12.4_10 + + + + +

Alan Coopersmith reports:

+
+

Ilja van Sprundel, a security researcher with IOActive, has + discovered a large number of issues in the way the X server + code base handles requests from X clients, and has worked + with X.Org's security team to analyze, confirm, and fix + these issues.

+ +

The vulnerabilities could be exploited to cause the X server + to access uninitialized memory or overwrite arbitrary memory + in the X server process. This can cause a denial of service + (e.g., an X server segmentation fault), or could be exploited + to achieve arbitrary code execution.

+ +

The GLX extension to the X Window System allows an X client + to send X protocol to the X server, to request that the X + server perform OpenGL rendering on behalf of the X client. + This is known as "GLX indirect rendering", as opposed to + "GLX direct rendering" where the X client submits OpenGL + rendering commands directly to the GPU, bypassing the X + server and avoiding the X server code for GLX protocol + handling.

+ +

Most GLX indirect rendering implementations share some + common ancestry, dating back to "Sample Implementation" + code from Silicon Graphics, Inc (SGI), which SGI + originally commercially licensed to other Unix workstation + and graphics vendors, and later released as open source, so + those vulnerabilities may affect other licensees of SGI's + code base beyond those running code from the X.Org Foundation + or the XFree86 Project.

+
+ +
+ + http://lists.x.org/archives/xorg-announce/2014-December/002500.html + CVE-2014-8091 + CVE-2014-8092 + CVE-2014-8093 + CVE-2014-8094 + CVE-2014-8095 + CVE-2014-8096 + CVE-2014-8097 + CVE-2014-8098 + CVE-2014-8099 + CVE-2014-8100 + CVE-2014-8101 + CVE-2014-8102 + + + 2014-12-09 + 2014-12-10 + +
+ unbound -- can be tricked into following an endless series of delegations, this consumes a lot of resources