Date: Tue, 17 Oct 2017 17:45:10 +0000 (UTC) From: Steve Wills <swills@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r452287 - head/security/vuxml Message-ID: <201710171745.v9HHjAcV057805@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: swills Date: Tue Oct 17 17:45:10 2017 New Revision: 452287 URL: https://svnweb.freebsd.org/changeset/ports/452287 Log: Document xorg issues Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Tue Oct 17 17:39:15 2017 (r452286) +++ head/security/vuxml/vuln.xml Tue Oct 17 17:45:10 2017 (r452287) @@ -58,6 +58,41 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="ab881a74-c016-4e6d-9f7d-68c8e7cedafb"> + <topic>xorg-server -- Multiple Issues</topic> + <affects> + <package> + <name>xorg-server</name> + <range><le>1.19.3</le></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>xorg-server developers reports:</p> + <blockquote cite="http://www.securityfocus.com/bid/99546"> + <p>In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events.</p> + <p>Uninitialized data in endianness conversion in the XEvent handling of the X.Org X Server before 2017-06-19 allowed authenticated malicious users to access potentially privileged data from the X server.</p> + </blockquote> + </body> + </description> + <references> + <url>http://www.securityfocus.com/bid/99546</url> + <url>https://bugzilla.suse.com/show_bug.cgi?id=1035283</url> + <url>https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c</url> + <url>https://cgit.freedesktop.org/xorg/xserver/commit/?id=8caed4df36b1f802b4992edcfd282cbeeec35d9d</url> + <url>https://cgit.freedesktop.org/xorg/xserver/commit/?id=ba336b24052122b136486961c82deac76bbde455</url> + <url>http://www.securityfocus.com/bid/99543</url> + <url>https://bugzilla.suse.com/show_bug.cgi?id=1035283</url> + <url>https://cgit.freedesktop.org/xorg/xserver/commit/?id=05442de962d3dc624f79fc1a00eca3ffc5489ced</url> + <cvename>CVE-2017-10971</cvename> + <cvename>CVE-2017-10972</cvename> + </references> + <dates> + <discovery>2017-07-06</discovery> + <entry>2017-10-17</entry> + </dates> + </vuln> + <vuln vid="a73518da-b2fa-11e7-98ef-d43d7ef03aa6"> <topic>Flash Player -- Remote code execution</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201710171745.v9HHjAcV057805>