Fixed                
                
            
            
                
                    Created: Jul 31, 2018   
                                            Updated: Oct 26, 2018                                    
                
                    
                                    
             
         
        
            
            
                                    
                        Resolved Date: Aug 14, 2018                    
                
                
                                    
                        Found In Version: 7.0                     
                
                                    
                        Fix Version: 7.0.0.29                    
                
                                        
                            Severity: Standard                        
                    
                                        
                            Applicable for: Wind River Linux 7                        
                    
                                    
                        Component/s: Userspace                    
                
                
                             
         
                        
                It was found that xorg-x11-server before 1.19.0 including uses memcmp() to check the received MIT cookie against a series of valid cookies. If the cookie is correct, it is allowed to attach to the Xorg session. Since most memcmp() implementations return after an invalid byte is seen, this causes a time difference between a valid and invalid byte, which could allow an efficient brute force attack.
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2624