CVE-2017-2624

NameCVE-2017-2624
DescriptionIt was found that xorg-x11-server before 1.19.0 including uses memcmp() to check the received MIT cookie against a series of valid cookies. If the cookie is correct, it is allowed to attach to the Xorg session. Since most memcmp() implementations return after an invalid byte is seen, this causes a time difference between a valid and invalid byte, which could allow an efficient brute force attack.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1186-1
Debian Bugs856398

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
xorg-server (PTS)jessie, jessie (lts)2:1.16.4-1+deb8u17fixed
stretch (security)2:1.19.2-1+deb9u9fixed
stretch (lts), stretch2:1.19.2-1+deb9u20fixed
buster, buster (lts)2:1.20.4-1+deb10u15fixed
buster (security)2:1.20.4-1+deb10u14fixed
bullseye2:1.20.11-1+deb11u13fixed
bullseye (security)2:1.20.11-1+deb11u14fixed
bookworm (security), bookworm2:21.1.7-3+deb12u8fixed
trixie2:21.1.14-2fixed
sid2:21.1.15-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
xorg-serversourcewheezy2:1.12.4-6+deb7u8DLA-1186-1
xorg-serversourcejessie2:1.16.4-1+deb8u2
xorg-serversource(unstable)2:1.19.2-1low856398

Notes

https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/

Search for package or bug name: Reporting problems