CVE-2015-3164

NameCVE-2015-3164
DescriptionThe authentication setup in XWayland 1.16.x and 1.17.x before 1.17.2 starts the server in non-authenticating mode, which allows local users to read from or send information to arbitrary X11 clients via vectors involving a UNIX socket.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
Debian Bugs788410

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
xorg-server (PTS)stretch2:1.19.2-1+deb9u5fixed
stretch (security)2:1.19.2-1+deb9u9fixed
buster, buster (security)2:1.20.4-1+deb10u4fixed
bullseye (security), bullseye2:1.20.11-1+deb11u1fixed
bookworm, sid2:21.1.3-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
xorg-serversourcesqueeze(not affected)
xorg-serversourcewheezy(not affected)
xorg-serversourcejessie2:1.16.4-1+deb8u2
xorg-serversource(unstable)2:1.17.2-1788410

Notes

[wheezy] - xorg-server <not-affected> (XWayland not present)
[squeeze] - xorg-server <not-affected> (XWayland not present)
http://lists.freedesktop.org/archives/wayland-devel/2015-June/022548.html
Patch 1/3: http://cgit.freedesktop.org/xorg/xserver/commit/?id=c4534a38b68aa07fb82318040dc8154fb48a9588
Patch 2/3: http://cgit.freedesktop.org/xorg/xserver/commit/?id=4b4b9086d02b80549981d205fb1f495edc373538
Patch 3/3: http://cgit.freedesktop.org/xorg/xserver/commit/?id=76636ac12f2d1dbdf7be08222f80e7505d53c451

Search for package or bug name: Reporting problems