cvrf2cusa/cvrf/2021/cvrf-openEuler-SA-2021-1235.xml
Jia Chao 0b34274085 git mv
Signed-off-by: Jia Chao <jiac13@chinaunicom.cn>
2024-07-25 09:57:37 +08:00

107 lines
6.8 KiB
XML

<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
<DocumentTitle xml:lang="en">An update for libX11 is now available for openEuler-20.03-LTS-SP1</DocumentTitle>
<DocumentType>Security Advisory</DocumentType>
<DocumentPublisher Type="Vendor">
<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
<IssuingAuthority>openEuler security committee</IssuingAuthority>
</DocumentPublisher>
<DocumentTracking>
<Identification>
<ID>openEuler-SA-2021-1235</ID>
</Identification>
<Status>Final</Status>
<Version>1.0</Version>
<RevisionHistory>
<Revision>
<Number>1.0</Number>
<Date>2021-06-22</Date>
<Description>Initial</Description>
</Revision>
</RevisionHistory>
<InitialReleaseDate>2021-06-22</InitialReleaseDate>
<CurrentReleaseDate>2021-06-22</CurrentReleaseDate>
<Generator>
<Engine>openEuler SA Tool V1.0</Engine>
<Date>2021-06-22</Date>
</Generator>
</DocumentTracking>
<DocumentNotes>
<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">libX11 security update</Note>
<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for libX11 is now available for openEuler-20.03-LTS-SP1.</Note>
<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">Core X11 protocol client library.
Security Fix(es):
LookupCol.c in X.Org X through X11R7.7 and libX11 before 1.7.1 might allow remote attackers to execute arbitrary code. The libX11 XLookupColor request (intended for server-side color lookup) contains a flaw allowing a client to send color-name requests with a name longer than the maximum size allowed by the protocol (and also longer than the maximum packet size for normal-sized packets). The user-controlled data exceeding the maximum size is then interpreted by the server as additional X protocol requests and executed, e.g., to disable X server authorization completely. For example, if the victim encounters malicious terminal control sequences for color codes, then the attacker may be able to take full control of the running graphical session.(CVE-2021-31535)</Note>
<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for libX11 is now available for openEuler-20.03-LTS-SP1.
openEuler Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Critical</Note>
<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">libX11</Note>
</DocumentNotes>
<DocumentReferences>
<Reference Type="Self">
<URL>https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1235</URL>
</Reference>
<Reference Type="openEuler CVE">
<URL>https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-31535</URL>
</Reference>
<Reference Type="Other">
<URL>https://nvd.nist.gov/vuln/detail/CVE-2021-31535</URL>
</Reference>
</DocumentReferences>
<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
<Branch Type="Product Name" Name="openEuler">
<FullProductName ProductID="openEuler-20.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">openEuler-20.03-LTS-SP1</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="aarch64">
<FullProductName ProductID="libX11-debuginfo-1.6.9-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libX11-debuginfo-1.6.9-5.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libX11-devel-1.6.9-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libX11-devel-1.6.9-5.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libX11-debugsource-1.6.9-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libX11-debugsource-1.6.9-5.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libX11-1.6.9-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libX11-1.6.9-5.oe1.aarch64.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="noarch">
<FullProductName ProductID="libX11-help-1.6.9-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libX11-help-1.6.9-5.oe1.noarch.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="src">
<FullProductName ProductID="libX11-1.6.9-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libX11-1.6.9-5.oe1.src.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="x86_64">
<FullProductName ProductID="libX11-devel-1.6.9-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libX11-devel-1.6.9-5.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libX11-debugsource-1.6.9-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libX11-debugsource-1.6.9-5.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libX11-1.6.9-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libX11-1.6.9-5.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libX11-debuginfo-1.6.9-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libX11-debuginfo-1.6.9-5.oe1.x86_64.rpm</FullProductName>
</Branch>
</ProductTree>
<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">LookupCol.c in X.Org X through X11R7.7 and libX11 before 1.7.1 might allow remote attackers to execute arbitrary code. The libX11 XLookupColor request (intended for server-side color lookup) contains a flaw allowing a client to send color-name requests with a name longer than the maximum size allowed by the protocol (and also longer than the maximum packet size for normal-sized packets). The user-controlled data exceeding the maximum size is then interpreted by the server as additional X protocol requests and executed, e.g., to disable X server authorization completely. For example, if the victim encounters malicious terminal control sequences for color codes, then the attacker may be able to take full control of the running graphical session.</Note>
</Notes>
<ReleaseDate>2021-06-22</ReleaseDate>
<CVE>CVE-2021-31535</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>Critical</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>9.8</BaseScore>
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>libX11 security update</Description>
<DATE>2021-06-22</DATE>
<URL>https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1235</URL>
</Remediation>
</Remediations>
</Vulnerability>
</cvrfdoc>