DEBIAN-CVE-2017-2624

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2017-2624
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2017-2624.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2017-2624
Upstream
Published
2018-07-27T18:29:00Z
Modified
2025-09-17T13:02:51Z
Summary
[none]
Details

It was found that xorg-x11-server before 1.19.0 including uses memcmp() to check the received MIT cookie against a series of valid cookies. If the cookie is correct, it is allowed to attach to the Xorg session. Since most memcmp() implementations return after an invalid byte is seen, this causes a time difference between a valid and invalid byte, which could allow an efficient brute force attack.

References

Affected packages

Debian:11 / xorg-server

Package

Name
xorg-server
Purl
pkg:deb/debian/xorg-server?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:1.19.2-1

Ecosystem specific

{
    "urgency": "low"
}

Debian:12 / xorg-server

Package

Name
xorg-server
Purl
pkg:deb/debian/xorg-server?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:1.19.2-1

Ecosystem specific

{
    "urgency": "low"
}

Debian:13 / xorg-server

Package

Name
xorg-server
Purl
pkg:deb/debian/xorg-server?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:1.19.2-1

Ecosystem specific

{
    "urgency": "low"
}

Debian:14 / xorg-server

Package

Name
xorg-server
Purl
pkg:deb/debian/xorg-server?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:1.19.2-1

Ecosystem specific

{
    "urgency": "low"
}