Bug 1500388 (CVE-2017-13723) - CVE-2017-13723 xorg-x11-server: Global buffer overflow in xkbtext.c
Summary: CVE-2017-13723 xorg-x11-server: Global buffer overflow in xkbtext.c
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2017-13723
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1500389 1910732
Blocks: 1500390
TreeView+ depends on / blocked
 
Reported: 2017-10-10 13:28 UTC by Andrej Nemec
Modified: 2022-04-17 20:53 UTC (History)
13 users (show)

Fixed In Version: xorg-x11-server 1.19.4
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2017-11-01 05:12:44 UTC
Embargoed:


Attachments (Terms of Use)

Description Andrej Nemec 2017-10-10 13:28:18 UTC
In X.Org Server (aka xserver and xorg-server) before 1.19.4, a local attacker authenticated to the X server could overflow a global buffer, causing crashes of the X server or potentially other problems by injecting large or malformed XKB related atoms and accessing them via xkbcomp.

References:

http://www.openwall.com/lists/oss-security/2017/10/04/10
https://lists.x.org/archives/xorg-announce/2017-October/002808.html

Upstream patch:

https://cgit.freedesktop.org/xorg/xserver/commit/?id=94f11ca5cf011ef123bd222cabeaef6f424d76ac

Comment 1 Andrej Nemec 2017-10-10 13:29:01 UTC
Created xorg-x11-server tracking bugs for this issue:

Affects: fedora-all [bug 1500389]


Note You need to log in before you can comment on or make changes to this bug.