[3.6] libxdmcp: weak entropy usage for session keys (CVE-2017-2625)
In the absence of arc4random(), xdmcp session keys are generated based
on getpid() and time(), which may allow a local attacker to
brute-force
the key.
Affected Version:
1.1.2 and lower
References:
https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/
https://bugzilla.redhat.com/show\_bug.cgi?id=CVE-2017-2625
(from redmine: issue id 6969, created on 2017-03-07, closed on 2019-03-19)
- Relations:
- parent #6968 (closed)
- Changesets:
- Revision 75609486 by Natanael Copa on 2017-05-31T09:32:29Z:
main/libxcmcp: build against libbsd (CVE-2017-2625)
Use arc4random_buf from libbsd
fixes #6969