Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 22 Aug 2018 15:15:20 -0700
From: Alan Coopersmith <>
Subject: Fwd: X.Org security advisory: August 22, 2018

-------- Forwarded Message --------
Subject: X.Org security advisory: August 22, 2018
Date: Wed, 22 Aug 2018 15:06:55 -0700
From: Alan Coopersmith <>

X.Org security advisory: August 22, 2018

Out-of-bounds write in libXcursor prior to 1.1.15

libXcursor could write one byte out of bounds when processing Xcursor
theme files.  In certain cases, such as when used in the Firefox web
browser, this could be used as part of an exploit chain to allow
further attacks on an X client process, as reported via Mozilla's
ASan Nightly project.   This issue has been assigned CVE-2015-9262.


A patch for this issue was committed to the libXcursor git repository
in 2015, and included in the libXcursor 1.1.15 release.


X.Org thanks Shubham Shrivastav of Samsung for reporting this issue to X.Org
originally, and Alex Gaynor of Mozilla for helping us understand how this
could be exploited by an attacker.

	-Alan Coopersmith-    
	  X.Org Security Response Team -

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.