Current-Users archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

NetBSD Security Advisory 2015-001: Protocol handling issues in X Window System servers



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

		 NetBSD Security Advisory 2015-001
		 =================================

Topic:		Protocol handling issues in X Window System servers

Version:	NetBSD-current:		affected prior to 2014-12-22
		NetBSD 7_BETA*:		affected
		NetBSD 6.1*:		affected 
		NetBSD 6.0*:		affected
		NetBSD 5.2*:		affected
		NetBSD 5.1*:		affected
		pkgsrc:			x11/xorg-server package prior 1.12.4nb7

Severity:	Local Privilege Escalation, Arbitrary Code Execuation

Fixed:		NetBSD-current:		December 22th, 2014
		NetBSD-7 branch:	December 22th, 2014
		NetBSD-6 branch:	December 22th, 2014
		NetBSD-6-1 branch:	December 22th, 2014
		NetBSD-6-0 branch:	December 22th, 2014
		NetBSD-5 branch:	December 22th, 2014
		NetBSD-5-2 branch:	December 22th, 2014
		NetBSD-5-1 branch:	December 22th, 2014
		pkgsrc 2014Q4:		xorg-server-1.12.4nb7 corrects this issue

Please note that NetBSD releases prior to 5.1 are no longer supported.
It is recommended that all users upgrade to a supported release.


Abstract
========

A large number of issues in the way the Xorg server processes requests
have been discovered by Ilja van Sprundel, a security researcher with
IOActive.  These issues could allow local users the ability to attack
a setuid Xorg server.

These problems are documented in CVE-2014-8091 to CVS-2014-8103.

http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/

Additionally, CVE-2013-6424 is also fixed with these updates.


Technical Details
=================

The issues come in 3 main categories:

- - Denial of service due to unchecked malloc in client authentication

	CVE-2014-8091: SUN-DES-1

- - Integer overflows calculating memory needs for requests

	CVE-2014-8092: X11 core protocol requests
	CVE-2014-8093: GLX extension
	CVE-2014-8094: DRI2 extension
	CVE-2013-6424: EXA and render extensions

- - Out of bounds access due to not validating length or offset values in requests

	CVE-2014-8095: XInput extension
	CVE-2014-8096: XC-MISC extension
	CVE-2014-8097: DBE extension
	CVE-2014-8098: GLX extension
	CVE-2014-8099: XVideo extension
	CVE-2014-8100: Render extension
	CVE-2014-8101: RandR extension
	CVE-2014-8102: XFixes extension
	CVE-2014-8103: DRI3 & Present extensions


Solutions and Workarounds
=========================

To apply a fixed version from a releng build, fetch a fitting xserver.tgz
from nyftp.netbsd.org and extract the fixed binaries:

cd /var/tmp
ftp http://nyftp.netbsd.org/pub/NetBSD-daily/REL/BUILD/ARCH/binary/sets/xserver.tgz
cd /
tar xzpf /var/tmp/xserver.tgz ./usr/X11R?/bin/X\*
tar xzpf /var/tmp/xserver.tgz ./usr/X11R?/lib/modules/extensions

as well as architecture-specific X servers.

with the following replacements:
REL   = the release version you are using
BUILD = the source date of the build. 20141223* and later will fit
ARCH  = your system's architecture


The following instructions describe how to upgrade your Xorg server
binaries by updating your source tree and rebuilding and
installing a new version of Xorg server.

The following instructions describe how to upgrade your Xorg server
binaries by updating your source tree and rebuilding and installing
a new version of Xorg server.

* NetBSD-current:

	Systems running NetBSD-current dated from before 2014-12-21
	should be upgraded to NetBSD-current dated 2014-12-22 or later.

	The following files/directories need to be updated from the
	netbsd-current CVS branch (aka HEAD):
		xsrc/external/mit/xorg-server/dist
		xsrc/xfree/xc/programs/Xserver

	To update from CVS, re-build, and re-install Xorg server:
		# cd xsrc
		# cvs update -d -P external/mit/xorg-server/dist
		# cd ..
		# cd src
		# cd external/mit/xorg/server/xorg-server
		# make USETOOLS=no cleandir dependall
		# make USETOOLS=no install

	For the acorn32, alpha, amiga, mac68k, pmax and sun3 ports,
	the following instructions should be used:
		# cd xsrc
		# cvs update -d -P xfree/xc/programs/Xserver
		# cd ..
		# cd src
		# cd x11/Xserver
		# make USETOOLS=no cleandir dependall
		# make USETOOLS=no install


* NetBSD 6.*:

	Systems running NetBSD 6.* sources dated from before
	2014-12-21 should be upgraded from NetBSD 6.* sources dated
	2014-12-22 or later.

	The following files/directories need to be updated from the
	netbsd-6, netbsd-6-1 or netbsd-6-0 branches:
		xsrc/external/mit/xorg-server/dist
		xsrc/xfree/xc/programs/Xserver

	To update from CVS, re-build, and re-install Xorg server:
		# cd xsrc
		# cvs update -d -P external/mit/xorg-server/dist
		# cd ..
		# cd src
		# cd external/mit/xorg/server/xorg-server
		# make USETOOLS=no cleandir dependall
		# make USETOOLS=no install

	For the acorn32, alpha, amiga, ews4800mips, mac68k, newsmips,
	pmax, sun3 and x68k ports, the following instructions should
	be used:
		# cd xsrc
		# cvs update -d -P xfree/xc/programs/Xserver
		# cd ..
		# cd src
		# cd x11/Xserver
		# make USETOOLS=no cleandir dependall
		# make USETOOLS=no install

* NetBSD 5.*:

	Systems running NetBSD 5.* sources dated from before
	2014-12-21 should be upgraded from NetBSD 5.* sources dated
	2014-12-22 or later.

	The following files/directories need to be updated from the
	netbsd-5, netbsd-5-2 or netbsd-5-1 branches:
		xsrc/external/mit/xorg-server/dist
		xsrc/xfree/xc/programs/Xserver

	To update from CVS, re-build, and re-install Xorg server:
		# cd xsrc
		# cvs update -d -P external/mit/xorg-server/dist
		# cd ..
		# cd src
		# cd external/mit/xorg/server/xorg-server
		# make USETOOLS=no cleandir dependall
		# make USETOOLS=no install

	For all but the amd64, i386, macppc, sgimips, shark and sparc64
	ports, the following instructions should be used:
		# cd xsrc
		# cvs update -d -P xfree/xc/programs/Xserver
		# cd ..
		# cd src
		# cd x11/Xserver
		# make USETOOLS=no cleandir dependall
		# make USETOOLS=no install


Thanks To
=========

Thanks to Ilja van Sprundel, IOActive and the Xorg security team for finding
and patching these issues.  Thanks to Matthew Green for backporting the fixes
to all active NetBSD branches and server sources.


Revision History
================

	2015-01-08	Initial release


More Information
================

Advisories may be updated as new information becomes available.
The most recent version of this advisory (PGP signed) can be found at 
  http://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2015-001.txt.asc

Information about NetBSD and NetBSD security can be found at
http://www.NetBSD.org/ and http://www.NetBSD.org/Security/ .

Copyright 2015, The NetBSD Foundation, Inc.  All Rights Reserved.
Redistribution permitted only in full, unmodified form.

$NetBSD: NetBSD-SA2015-001.txt,v 1.1 2015/01/08 21:02:23 tonnerre Exp $
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=HV5g
-----END PGP SIGNATURE-----


Home | Main Index | Thread Index | Old Index