X.Org Libraries Hit By Round Of Security Issues
It was just last month that there was an X.Org Server security issue dealing with hot-plugging of input devices. Being announced today is a new round of security problems, this time multiple issues dealing with X.Org client libraries.
Alan Coopersmith of Oracle and X.Org veteran publicly shared the discovered security problems today:
Ilja van Sprundel, a security researcher with IOActive, has discovered a large number of issues in the way various X client libraries handle the responses they receive from servers, and has worked with X.Org's security team to analyze, confirm, and fix these issues.The noted security vulnerabilities come down to integer overflows calculating memory needs for replies, sign extension issues, buffer overflows from not validating length or offset values, integer overflows parsing user-specified files, and memory corruption due to unchecked return values.
There are issues concerning libX11, libXext, libXfices, LibXi, libXinerama, LibXp, libXrandr, libXrender, libXRes, libXtst, libXv, libXvMC, libXxf86dga, libdmx, libxcb, libGLX, libchromeXvMC, libFS, libXcursor, and libXt. Fortunately, X.Org developers are preparing new packages for all of these X.Org libraries to mitigate these security vulnerabilities.
Latest Linux Hardware Reviews
Latest Linux Articles
Latest Linux News
Latest Forum Discussions