安全公告详情

NS-SA-2025-0194

2025-07-25 16:49:52

简介

important: xorg-x11-server/sssd security update

严重级别

important

主题

An update for xorg-x11-server/sssd is now available for NewStart CGSL MAIN 7.02.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

xorg-x11-server:
sssd:


Security Fix(es):
xorg-x11-server: A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.(CVE-2024-31083)
xorg-x11-server: A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.(CVE-2024-31080)
xorg-x11-server: A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.(CVE-2024-31081)
xorg-x11-server: A heap-based buffer over-read vulnerability was found in the X.org server's ProcAppleDRICreatePixmap() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.(CVE-2024-31082)
xorg-x11-server: A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.(CVE-2024-0409)
xorg-x11-server: A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.(CVE-2024-0408)
xorg-x11-server: A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.(CVE-2023-5367)
xorg-x11-server: A use-after-free flaw was found in the xorg-x11-server. An X server crash may occur in a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode) if the pointer is warped from within a window on one screen to the root window of the other screen and if the original window is destroyed followed by another window being destroyed.(CVE-2023-5380)
xorg-x11-server: A vulnerability was found in X.Org Server. This flaw occurs if a client explicitly destroys the compositor overlay window (aka COW), where Xserver leaves a dangling pointer to that window in the CompScreen structure, which will later trigger a use-after-free issue. The Overlay Window use-after-free issue can lead to a local privilege escalation vulnerability.(CVE-2023-1393)
xorg-x11-server: bugfix
sssd: A race condition flaw was found in sssd where the GPO policy is not consistently applied for authenticated users. This may lead to improper authorization issues, granting or denying access to resources inappropriately.(CVE-2023-3758)
sssd: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 7.02.03B8.

影响组件

  • xorg-x11-server
  • sssd

影响产品

  • CGSL MAIN 7.02

更新包

{"fix":[{"product":"CGSL MAIN 7.02","pkgs":[{"binary":["xorg-x11-server-Xorg-1.20.14-13.zncgsl7.4.x86_64.rpm","xorg-x11-server-common-1.20.14-13.zncgsl7.4.x86_64.rpm"],"source":"xorg-x11-server-1.20.14-13.zncgsl7.4.src.rpm"},{"binary":["sssd-proxy-2.9.4-2.zncgsl7.2.x86_64.rpm","sssd-nfs-idmap-2.9.4-2.zncgsl7.2.x86_64.rpm","sssd-ldap-2.9.4-2.zncgsl7.2.x86_64.rpm","sssd-krb5-common-2.9.4-2.zncgsl7.2.x86_64.rpm","sssd-ipa-2.9.4-2.zncgsl7.2.x86_64.rpm","sssd-krb5-2.9.4-2.zncgsl7.2.x86_64.rpm","sssd-common-pac-2.9.4-2.zncgsl7.2.x86_64.rpm","sssd-common-2.9.4-2.zncgsl7.2.x86_64.rpm","sssd-client-2.9.4-2.zncgsl7.2.x86_64.rpm","sssd-ad-2.9.4-2.zncgsl7.2.x86_64.rpm","sssd-2.9.4-2.zncgsl7.2.x86_64.rpm","python3-sssdconfig-2.9.4-2.zncgsl7.2.noarch.rpm","libsss_nss_idmap-2.9.4-2.zncgsl7.2.x86_64.rpm","libsss_sudo-2.9.4-2.zncgsl7.2.x86_64.rpm","libsss_idmap-2.9.4-2.zncgsl7.2.x86_64.rpm","libsss_certmap-2.9.4-2.zncgsl7.2.x86_64.rpm","libsss_autofs-2.9.4-2.zncgsl7.2.x86_64.rpm","libipa_hbac-2.9.4-2.zncgsl7.2.x86_64.rpm"],"source":"sssd-2.9.4-2.zncgsl7.2.src.rpm"}]}]}

CVE

参考