<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<atom:link href="https://dev1galaxy.org/extern.php?action=feed&amp;tid=4719&amp;type=rss" rel="self" type="application/rss+xml" />
		<title><![CDATA[Dev1 Galaxy Forum / X.Org Security Advisory]]></title>
		<link>https://dev1galaxy.org/viewtopic.php?id=4719</link>
		<description><![CDATA[The most recent posts in X.Org Security Advisory.]]></description>
		<lastBuildDate>Tue, 14 Dec 2021 16:57:46 +0000</lastBuildDate>
		<generator>FluxBB</generator>
		<item>
			<title><![CDATA[Re: X.Org Security Advisory]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=33272#p33272</link>
			<description><![CDATA[<p>Hello:</p><div class="quotebox"><cite>Head_on_a_Stick wrote:</cite><blockquote><div><p>Thanks for the heads-up ...</p></div></blockquote></div><p>You&#039;re welcome.</p><div class="quotebox"><cite>Head_on_a_Stick wrote:</cite><blockquote><div><div class="quotebox"><cite>Altoid wrote:</cite><blockquote><div><p>on systems where the X server is running privileged</p></div></blockquote></div><p>... does not apply to any Devuan beowulf (or later) systems that use <span class="bbc">startx</span> ...</p></div></blockquote></div><p>I&#039;m still using SLiM which I&#039;m happy to see made it into <span class="bbc">/merged chimaera/main amd64</span>.</p><div class="quotebox"><cite>Head_on_a_Stick wrote:</cite><blockquote><div><p>... posted from Wayland</p></div></blockquote></div><p>Whatever rocks your <span class="bbs">boat</span> desktop.&#160; =^)</p><p>Best,</p><p>A.</p>]]></description>
			<author><![CDATA[dummy@example.com (Altoid)]]></author>
			<pubDate>Tue, 14 Dec 2021 16:57:46 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=33272#p33272</guid>
		</item>
		<item>
			<title><![CDATA[Re: X.Org Security Advisory]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=33271#p33271</link>
			<description><![CDATA[<p>Thanks for the heads-up Altoid.</p><p>Just for the record:</p><div class="quotebox"><cite>Altoid wrote:</cite><blockquote><div><p>on systems where the X server is running privileged</p></div></blockquote></div><p>^ This does not apply to any Devuan beowulf (or later) systems that use <span class="bbc">startx</span> to launch the desktop (or GDM but I don&#039;t think that&#039;s very popular here).</p><p>EDIT: posted from Wayland <img src="https://dev1galaxy.org/img/smilies/tongue.png" width="15" height="15" alt="tongue" /></p>]]></description>
			<author><![CDATA[dummy@example.com (Head_on_a_Stick)]]></author>
			<pubDate>Tue, 14 Dec 2021 16:12:42 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=33271#p33271</guid>
		</item>
		<item>
			<title><![CDATA[X.Org Security Advisory]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=33269#p33269</link>
			<description><![CDATA[<p>Hello:</p><p>Just got this in my mailbox, good to see things are working as they should:</p><p>---</p><p>X.Org Security Advisory: December 14, 2021</p><p>Multiple input validation failures in X server extensions<br />=========================================================</p><p>All of the following issues can lead to local privileges elevation on<br />systems where the X server is running privileged and remote code<br />execution for ssh X forwarding sessions.</p><p>* CVE-2021-4008/ZDI-CAN-14192 SProcRenderCompositeGlyphs out-of-bounds<br />access</p><p>The handler for the CompositeGlyphs request of the Render extension does<br />not properly validate the request length leading to out of bounds memory<br />write.</p><p>* CVE-2021-4009/ZDI-CAN 14950 SProcXFixesCreatePointerBarrier<br />out-of-bounds access</p><p>The handler for the CreatePointerBarrier request of the XFixes extension<br />does not properly validate the request length leading to out of bounds<br />memory write.</p><p>* CVE-2021-4010/ZDI-CAN-14951 SProcScreenSaverSuspend out-of-bounds access</p><p>The handler for the Suspend request of the Screen Saver extension does<br />not properly validate the request length leading to out of bounds memory<br />write.</p><p>* CVE-2021-4011/ZDI-CAN-14952 SwapCreateRegister out-of-bounds access</p><p>The handlers for the RecordCreateContext and RecordRegisterClients<br />requests of the Record extension do not properly validate the request<br />length leading to out of bounds memory write.</p><p>Patches<br />-------</p><p>Patches for this issues have been commited to the xorg server git<br />repository (<a href="https://gitlab.freedesktop.org/xorg/xserver" rel="nofollow">https://gitlab.freedesktop.org/xorg/xserver</a>). xorg-server<br />21.1.2 will be released shortly and will include these patches.</p><p>commit ebce7e2d80e7c80e1dda60f2f0bc886f1106ba60</p><p>&#160; &#160; render: Fix out of bounds access in SProcRenderCompositeGlyphs()</p><p>&#160; &#160; ZDI-CAN-14192, CVE-2021-4008</p><p>&#160; &#160; This vulnerability was discovered and the fix was suggested by:<br />&#160; &#160; Jan-Niklas Sohn working with Trend Micro Zero Day Initiative</p><p>commit b5196750099ae6ae582e1f46bd0a6dad29550e02</p><p>&#160; &#160; xfixes: Fix out of bounds access in *ProcXFixesCreatePointerBarrier()</p><p>&#160; &#160; ZDI-CAN-14950, CVE-2021-4009</p><p>&#160; &#160; This vulnerability was discovered and the fix was suggested by:<br />&#160; &#160; Jan-Niklas Sohn working with Trend Micro Zero Day Initiative</p><p>commit 6c4c53010772e3cb4cb8acd54950c8eec9c00d21</p><p>&#160; &#160; Xext: Fix out of bounds access in SProcScreenSaverSuspend()</p><p>&#160; &#160; ZDI-CAN-14951, CVE-2021-4010</p><p>&#160; &#160; This vulnerability was discovered and the fix was suggested by:<br />&#160; &#160; Jan-Niklas Sohn working with Trend Micro Zero Day Initiative</p><p>commit e56f61c79fc3cee26d83cda0f84ae56d5979f768</p><p>&#160; &#160; record: Fix out of bounds access in SwapCreateRegister()</p><p>&#160; &#160; ZDI-CAN-14952, CVE-2021-4011</p><p>&#160; &#160; This vulnerability was discovered and the fix was suggested by:<br />&#160; &#160; Jan-Niklas Sohn working with Trend Micro Zero Day Initiative</p><p>Thanks<br />======</p><p>This vulnerability was discovered by Jan-Niklas Sohn working with<br />Trend Micro Zero Day Initiative.</p><p>--<br />Povilas Kanapickas</p><p>---</p><p>Best,</p><p>A.</p>]]></description>
			<author><![CDATA[dummy@example.com (Altoid)]]></author>
			<pubDate>Tue, 14 Dec 2021 14:33:16 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=33269#p33269</guid>
		</item>
	</channel>
</rss>
