libxdmcp: weak entropy usage for session keys (CVE-2017-2625)
In the absence of arc4random(), xdmcp session keys are generated based
on getpid() and time(), which may allow a local attacker to
brute-force
the key.
Affected Version:
1.1.2 and lower
References:
https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/
https://bugzilla.redhat.com/show\_bug.cgi?id=CVE-2017-2625
(from redmine: issue id 6968, created on 2017-03-07, closed on 2019-03-19)
- Relations:
- child #6969 (closed)
- child #6970 (closed)
- child #6971 (closed)
- child #6972 (closed)
- child #6973 (closed)
- Changesets:
- Revision b83414a3 by Natanael Copa on 2017-05-31T09:30:47Z:
main/libxcmcp: build against libbsd (CVE-2017-2625)
Use arc4random_buf from libbsd
ref #6968