Bug 58437 - xorg-server: Multiple issues (5.2)
Summary: xorg-server: Multiple issues (5.2)
Status: CLOSED FIXED
Alias: None
Product: UCS
Classification: Unclassified
Component: Security updates
Version: UCS 5.2
Hardware: All Linux
: P3 normal
Target Milestone: UCS 5.2-2-errata
Assignee: Quality Assurance
QA Contact: Christian Castens
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2025-06-30 23:42 CEST by Quality Assurance
Modified: 2025-07-02 14:51 CEST (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Customer ID:
Max CVSS v3 score: 6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H) NVD


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2025-06-30 23:42:54 CEST
New Debian xorg-server 2:21.1.7-3+deb12u10 fixes:
This update addresses the following issues:
2:21.1.7-3+deb12u10 (Fri, 20 Jun 2025 14:46:37 +0200)
* Non-maintainer upload by the Security Team.
* render: Avoid 0 or less animated cursors (CVE-2025-49175)
* os: Do not overflow the integer size with BigRequest (CVE-2025-49176)
* xfixes: Check request length for SetClientDisconnectMode (CVE-2025-49177)
* os: Account for bytes to ignore when sharing input buffer (CVE-2025-49178)
* record: Check for overflow in RecordSanityCheckRegisterClients()  (CVE-2025-49179)
* randr: Check for overflow in RRChangeProviderProperty() (CVE-2025-49180)
* xfree86: Check for RandR provider functions (CVE-2025-49180)
* os: Check for integer overflow on BigRequest length (CVE-2025-49176)
Comment 1 Quality Assurance univentionstaff 2025-07-01 00:00:12 CEST
--- mirror/ftp/pool/main/x/xorg-server/xorg-server_21.1.7-3+deb12u9.dsc
+++ apt/ucs_5.2-0-errata5.2-2/source/xorg-server_21.1.7-3+deb12u10.dsc
@@ -1,3 +1,16 @@
+2:21.1.7-3+deb12u10 [Fri, 20 Jun 2025 14:46:37 +0200] Salvatore Bonaccorso <carnil@debian.org>:
+
+  * Non-maintainer upload by the Security Team.
+  * render: Avoid 0 or less animated cursors (CVE-2025-49175)
+  * os: Do not overflow the integer size with BigRequest (CVE-2025-49176)
+  * xfixes: Check request length for SetClientDisconnectMode (CVE-2025-49177)
+  * os: Account for bytes to ignore when sharing input buffer (CVE-2025-49178)
+  * record: Check for overflow in RecordSanityCheckRegisterClients()
+    (CVE-2025-49179)
+  * randr: Check for overflow in RRChangeProviderProperty() (CVE-2025-49180)
+  * xfree86: Check for RandR provider functions (CVE-2025-49180)
+  * os: Check for integer overflow on BigRequest length (CVE-2025-49176)
+
 2:21.1.7-3+deb12u9 [Wed, 19 Feb 2025 14:42:13 +0100] Salvatore Bonaccorso <carnil@debian.org>:
 
   * Non-maintainer upload by the Security Team.

<http://piuparts.knut.univention.de/5.2-2/#4789622312207859838>
Comment 2 Christian Castens univentionstaff 2025-07-02 10:36:56 CEST
OK: bug
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[5.2-2] 48e9c63d9b Bug #58437: xorg-server 2:21.1.7-3+deb12u10
 doc/errata/staging/xorg-server.yaml | 24 ++++++++++++++++++++++++
 1 file changed, 24 insertions(+)
Comment 3 Christian Castens univentionstaff 2025-07-02 14:51:49 CEST
<https://errata.software-univention.de/#/?erratum=5.2x136>