[Bug 248409] x11/libX11: update to 1.6.10 - fixed CVE-2020-14344
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Sat Aug 1 11:23:29 UTC 2020
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=248409
Bug ID: 248409
Summary: x11/libX11: update to 1.6.10 - fixed CVE-2020-14344
Product: Ports & Packages
Version: Latest
Hardware: Any
URL: https://lists.x.org/archives/xorg-announce/2020-July/0
03050.html
OS: Any
Status: New
Severity: Affects Only Me
Priority: ---
Component: Individual Port(s)
Assignee: x11 at FreeBSD.org
Reporter: vvd at unislabs.com
CC: joneum at FreeBSD.org, ports-secteam at FreeBSD.org
Flags: maintainer-feedback?(x11 at FreeBSD.org)
Assignee: x11 at FreeBSD.org
Attachment #216934 maintainer-approval?
Flags:
Flags: maintainer-feedback?
Created attachment 216934
--> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=216934&action=edit
update to 1.6.10 - fixed CVE-2020-14344
X.Org security advisory: July 31, 2020
Heap corruption in the X input method client in libX11
======================================================
CVE-2020-14344
The X Input Method (XIM) client implementation in libX11 has some
integer overflows and signed/unsigned comparison issues that can lead
to heap corruption when handling malformed messages from an input
method.
Patches
=======
Patches for these issues have been commited to the libX11 git repository.
libX11 1.6.10 will be released shortly and will include those patches.
https://gitlab.freedesktop.org/xorg/lib/libx11
commit 1703b9f3435079d3c6021e1ee2ec34fd4978103d (HEAD -> master)
Change the data_len parameter of _XimAttributeToValue() to CARD16
It's coming from a length in the protocol (unsigned) and passed
to functions that expect unsigned int parameters (_XCopyToArg()
and memcpy()).
commit 1a566c9e00e5f35c1f9e7f3d741a02e5170852b2
Zero out buffers in functions
It looks like uninitialized stack or heap memory can leak
out via padding bytes.
commit 2fcfcc49f3b1be854bb9085993a01d17c62acf60
Fix more unchecked lengths
commit 388b303c62aa35a245f1704211a023440ad2c488
fix integer overflows in _XimAttributeToValue()
commit 0e6561efcfaa0ae7b5c74eac7e064b76d687544e
Fix signed length values in _XimGetAttributeID()
The lengths are unsigned according to the specification. Passing
negative values can lead to data corruption.
Thanks
======
X.Org thanks Todd Carson for reporting these issues to our security
team and assisting them in understanding them and providing fixes.
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the freebsd-x11
mailing list