Bug 16182 - x11-server new security issue CVE-2015-3164
Summary: x11-server new security issue CVE-2015-3164
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 5
Hardware: i586 Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/648969/
Whiteboard: MGA5-64-OK MGA5-32-OK advisory
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2015-06-22 22:42 CEST by David Walser
Modified: 2015-08-21 20:56 CEST (History)
4 users (show)

See Also:
Source RPM: x11-server-1.16.4-2.mga5.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2015-06-22 22:42:10 CEST
Upstream has issued an advisory on June 10:
http://lists.x.org/archives/xorg-announce/2015-June/002611.html

OpenSuSE has issued an advisory for this today (June 22):
http://lists.opensuse.org/opensuse-updates/2015-06/msg00044.html

Upstream commits to fix this issue are linked from the SuSE bug:
https://bugzilla.suse.com/show_bug.cgi?id=934102

Reproducible: 

Steps to Reproduce:
Comment 1 Sander Lepik 2015-07-25 13:18:00 CEST
Thierry, ping :)

CC: (none) => mageia

Comment 2 Sander Lepik 2015-08-15 14:05:29 CEST
I've applied the patches from SuSE's bug and submitted it into 5/core/updates_testing

SRPM:
x11-server-1.16.4-2.1.mga5.src.rpm

RPMs:
x11-server-xwayland-1.16.4-2.1.mga5
x11-server-xvfb-1.16.4-2.1.mga5
x11-server-xorg-1.16.4-2.1.mga5
x11-server-xnest-1.16.4-2.1.mga5
x11-server-xfbdev-1.16.4-2.1.mga5
x11-server-xfake-1.16.4-2.1.mga5
x11-server-xephyr-1.16.4-2.1.mga5
x11-server-xdmx-1.16.4-2.1.mga5
x11-server-devel-1.16.4-2.1.mga5
x11-server-common-1.16.4-2.1.mga5
x11-server-1.16.4-2.1.mga5
x11-server-source-1.16.4-2.1.mga5.noarch
Comment 3 David Walser 2015-08-15 19:35:33 CEST
Thanks Sander!

Advisory:
========================

Updated x11-server packages fix security vulnerability:

The authentication setup in XWayland 1.16.x and 1.17.x before 1.17.2 starts the
server in non-authenticating mode, which allows local users to read from or
send information to arbitrary X11 clients via vectors involving a UNIX socket
(CVE-2015-3164).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3164
http://lists.x.org/archives/xorg-announce/2015-June/002611.html
http://lists.opensuse.org/opensuse-updates/2015-06/msg00044.html

Assignee: thierry.vignaud => qa-bugs

Comment 4 Lewis Smith 2015-08-16 21:38:54 CEST
Testing Mageia 5 x64 real hardware with AMD/ATI/Radeon video

Installed directly from Updates Testing x11-server-xwayland because I did not have it, but the X11 update is specifically for that. And updated main X11 to:
 x11-server-common-1.16.4-2.1.mga5
 x11-server-xorg-1.16.4-2.1.mga5
 x11-server-xwayland-1.16.4-2.1.mga5
Re-started the X server, and using the resulting system shows nothing untoward.
Update deemed OK.

CC: (none) => lewyssmith
Whiteboard: (none) => MGA5-64-OK

Comment 5 William Kenney 2015-08-17 16:21:37 CEST
In VirtualBox, M5, KDE, 32-bit

Package(s) under test:
x11-server-common x11-server-xorg

default install of x11-server-common & x11-server-xorg

[root@localhost wilcal]# urpmi x11-server-common
Package x11-server-common-1.16.4-2.mga5.i586 is already installed
[root@localhost wilcal]# urpmi x11-server-xorg
Package x11-server-xorg-1.16.4-2.mga5.i586 is already installed

KDE desktop and various apps work fine

install x11-server-common & x11-server-xorg from updates_testing

[root@localhost wilcal]# urpmi x11-server-common
Package x11-server-common-1.16.4-2.1.mga5.i586 is already installed
[root@localhost wilcal]# urpmi x11-server-xorg
Package x11-server-xorg-1.16.4-2.1.mga5.i586 is already installed

KDE desktop and various apps work fine

CC: (none) => wilcal.int

Comment 6 William Kenney 2015-08-17 16:32:32 CEST
In VirtualBox, M5, KDE, 64-bit

Package(s) under test:
x11-server-common x11-server-xorg

default install of x11-server-common & x11-server-xorg

[root@localhost wilcal]# urpmi x11-server-common
Package x11-server-common-1.16.4-2.mga5.x86_64 is already installed
[root@localhost wilcal]# urpmi x11-server-xorg
Package x11-server-xorg-1.16.4-2.mga5.x86_64 is already installed

KDE desktop and various apps work fine

install x11-server-common & x11-server-xorg from updates_testing

[root@localhost wilcal]# urpmi x11-server-common
Package x11-server-common-1.16.4-2.1.mga5.x86_64 is already installed
[root@localhost wilcal]# urpmi x11-server-xorg
Package x11-server-xorg-1.16.4-2.1.mga5.x86_64 is already installed

KDE desktop and various apps work fine
Comment 7 James Kerr 2015-08-20 13:24:36 CEST
Testing using Gnome on mga-5-32

 rpm -qa | grep x11-server
x11-server-xorg-1.16.4-2.mga5
x11-server-common-1.16.4-2.mga5

Installing from testing:

urpmi --search-media "Core Updates Testing" x11-server-xorg x11-server-common
Marking x11-server-xorg as manually installed, it won't be auto-orphaned
writing /var/lib/rpm/installed-through-deps.list
    ftp://192.168.0.2//pub/mirror/Mageia/distrib/5/i586/media/core/updates_testing/x11-server-common-1.16.4-2.1.mga5.i586.rpm
    ftp://192.168.0.2//pub/mirror/Mageia/distrib/5/i586/media/core/updates_testing/x11-server-xorg-1.16.4-2.1.mga5.i586.rpm
installing x11-server-xorg-1.16.4-2.1.mga5.i586.rpm x11-server-common-1.16.4-2.1.mga5.i586.rpm from /var/cache/urpmi/rpms

After restart logged on to Gnome normally.

Tested several applications including libreoffice and firefox with flash-player.

All seem to be working Ok

OK for mga-5-32

The security issue seems to be related in particular to wayland. What, if anything, actually uses wayland?

Whiteboard: MGA5-64-OK => MGA5-64-OK MGA5-32-OK

Comment 8 James Kerr 2015-08-20 13:27:44 CEST
Is it now OK to validate this update? We haven't tested wayland, since none of us seem to use it.
Comment 9 David Walser 2015-08-20 13:38:54 CEST
(In reply to James Kerr from comment #8)
> Is it now OK to validate this update? We haven't tested wayland, since none
> of us seem to use it.

Yeah, go ahead and validate it.  This issue isn't a big deal for us since we don't use wayland.
Comment 10 James Kerr 2015-08-20 13:46:05 CEST
This update is now validated.

Would a qa-committer upload the advisory to SVN. 

The packages can then be pushed to updates.

Keywords: (none) => validated_update
CC: (none) => sysadmin-bugs

Rémi Verschelde 2015-08-21 16:30:40 CEST

Whiteboard: MGA5-64-OK MGA5-32-OK => MGA5-64-OK MGA5-32-OK advisory

Comment 11 Mageia Robot 2015-08-21 20:56:05 CEST
An update for this issue has been pushed to Mageia Updates repository.

http://advisories.mageia.org/MGASA-2015-0316.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.