|
Message-ID: <20201201151602.GC10502@herrb.net> Date: Tue, 1 Dec 2020 16:16:02 +0100 From: Matthieu Herrb <matthieu@...rb.eu> To: oss-security@...ts.openwall.com Subject: X.Org server security advisory: December 1, 2020 Multiple input validation failures in X server XKB extension ============================================================ These issues can lead to privileges elevations for authorized clients on systems where the X server is running privileged. * CVE-2020-14360 / ZDI CAN 11572 XkbSetMap Out-Of-Bounds Access Insufficient checks on the lengths of the XkbSetMap request can lead to out of bounds memory accesses in the X server. * CVE-2020-25712 / ZDI-CAN-11839 XkbSetDeviceInfo Heap-based Buffer Overflow Insufficient checks on input of the XkbSetDeviceInfo request can lead to a buffer overflow on the head in the X server. Patches ------- Patches for these issues have been committed to the xorg server git repository. xorg-server 1.20.10 will be released shortly and will include these patches. https://gitlab.freedesktop.org/xorg/xserver.git commit 446ff2d3177087b8173fa779fa5b77a2a128988b Check SetMap request length carefully. Avoid out of bounds memory accesses on too short request. ZDI-CAN 11572 / CVE-2020-14360 commit 87c64fc5b0db9f62f4e361444f4b60501ebf67b9 Fix XkbSetDeviceInfo() and SetDeviceIndicators() heap overflows ZDI-CAN 11389 / CVE-2020-25712 Thanks ====== These vulnerabilities have been discovered by Jan-Niklas Sohn working with Trend Micro Zero Day Initiative. -- Matthieu Herrb
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.