Bug 950438 (CVE-2013-1940)
Summary: | CVE-2013-1940 xorg-x11-server: Information disclosure due enabling events from hot-plug devices despite input from the device being momentarily disabled | ||||||
---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Jan Lieskovsky <jlieskov> | ||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
Status: | CLOSED ERRATA | QA Contact: | |||||
Severity: | low | Docs Contact: | |||||
Priority: | low | ||||||
Version: | unspecified | CC: | airlied, ajax, jrusnack, kem, peter.hutterer, security-response-team | ||||
Target Milestone: | --- | Keywords: | Security | ||||
Target Release: | --- | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | xorg-server-1.13.4, xorg-server-1.14.1 | Doc Type: | Bug Fix | ||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2013-11-22 05:37:32 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | 952949, 1015161, 1016412 | ||||||
Bug Blocks: | 950455, 974906 | ||||||
Attachments: |
|
Description
Jan Lieskovsky
2013-04-10 08:58:06 UTC
Acknowledgements: This issue was found by David Airlie and Peter Hutterer of Red Hat. This issue did NOT affect the version of the xorg-x11-server package, as shipped with Red Hat Enterprise Linux 5. -- This issue affects the version of the xorg-x11-server package, as shipped with Red Hat Enterprise Linux 6. This issue affects the versions of the xorg-x11-server package, as shipped with Fedora release of 17 and 18. Upstream bug: https://bugs.freedesktop.org/show_bug.cgi?id=63353 Created attachment 733595 [details]
Upstream patch
This issue has been classified as low impact because of the following reason(s): In order to exploit this issue, the attacker needs to - have an account on the target machine, or otherwise be able to start an app listening for key events. - have physical access to the machine to hotplug the keyboard or some other device. - be logged in at the time, but vt-switch away without the screen lock being activated. - In order to capture passwords etc, the other-use needs to have a short enough password or the other user doesn't do anything else, otherwise the events will overrun the buffer and you only get a fraction of them Created xorg-x11-server tracking bugs for this issue Affects: fedora-all [bug 952949] Upstream patch: http://cgit.freedesktop.org/xorg/xserver/commit/?id=6ca03b9161d33b1d2b55a3a1a913cf88deb2343f xorg-x11-server-1.13.3-3.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report. xorg-x11-server-1.14.0-6.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report. Related blog posts: http://who-t.blogspot.cz/2013/04/cve-2013-1940-vt-switched-servers.html https://plus.google.com/104877287288155269055/posts/YqUmH95LTkh xorg-x11-server-1.12.4-7.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report. This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2013:1620 https://rhn.redhat.com/errata/RHSA-2013-1620.html Statement: (none) |