Bug 46142 - libx11: Multiple issues (4.2)
libx11: Multiple issues (4.2)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.2
Other Linux
: P5 normal (vote)
: UCS 4.2-3-errata
Assigned To: Philipp Hahn
Arvid Requate
http://metadata.ftp-master.debian.org...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2018-01-24 19:18 CET by Philipp Hahn
Modified: 2018-05-08 14:56 CEST (History)
1 user (show)

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 5.0 (CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Philipp Hahn univentionstaff 2018-01-24 19:18:10 CET
libx11 (2:1.6.2-3+deb8u1) jessie; urgency=medium

  * Insufficient validation of data from the X server can cause out of
    boundary memory read (XGetImage()) or write (XListFonts()).
    Addresses CVE-2016-7942 and CVE-2016-7943.
Comment 1 Philipp Hahn univentionstaff 2018-01-25 10:59:51 CET
Mass-import from Debian-Security:
  python -m univention.repong.^Cbmirror -s jessie -r 4.2-3 --override=$HOME/REPOS/repo-ng/mirror/update_ucs42_mirror_from_debian.yml --errata=doc/errata --sql --process=ALL -vvvv --now=201801211553

YAML: git:bd6159834a..449aa5a7cf
Comment 2 Quality Assurance univentionstaff 2018-05-04 16:58:14 CEST
--- mirror/ftp/4.2/unmaintained/4.2-0/source/libx11_1.6.2-3.dsc
+++ apt/ucs_4.2-0-errata4.2-3/source/libx11_1.6.2-3+deb8u1.dsc
@@ -1,3 +1,9 @@
+2:1.6.2-3+deb8u1 [Sat, 28 Jan 2017 14:01:35 +0100] Julien Cristau <jcristau@debian.org>:
+
+  * Insufficient validation of data from the X server can cause out of
+    boundary memory read (XGetImage()) or write (XListFonts()).
+    Addresses CVE-2016-7942 and CVE-2016-7943.
+
 2:1.6.2-3 [Mon, 18 Aug 2014 01:39:32 +0200] Cyril Brulebois <kibi@debian.org>:
 
   [ Julien Cristau ]
Comment 3 Arvid Requate univentionstaff 2018-05-08 11:59:31 CEST
* No UCS specific patches
* Comparison to previously shipped version ok
* Binary package update Ok
* Advisory adjusted:
  514a2fb45e | Sort CVEs
Comment 4 Arvid Requate univentionstaff 2018-05-08 14:56:47 CEST
<http://errata.software-univention.de/ucs/4.2/357.html>