<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<atom:link href="https://dev1galaxy.org/extern.php?action=feed&amp;tid=5750&amp;type=rss" rel="self" type="application/rss+xml" />
		<title><![CDATA[Dev1 Galaxy Forum / X.Org Security Advisory: Sub-object overflows in libX11]]></title>
		<link>https://dev1galaxy.org/viewtopic.php?id=5750</link>
		<description><![CDATA[The most recent posts in X.Org Security Advisory: Sub-object overflows in libX11.]]></description>
		<lastBuildDate>Fri, 16 Jun 2023 01:45:26 +0000</lastBuildDate>
		<generator>FluxBB</generator>
		<item>
			<title><![CDATA[X.Org Security Advisory: Sub-object overflows in libX11]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=42556#p42556</link>
			<description><![CDATA[<p>Hello:</p><p>Got this today in my inbox:</p><p>-------------------------------------------------------------------------------------------</p><p>X.Org Security Advisory: June 15, 2023</p><p>Buffer overflows in InitExt.c in libX11 prior to 1.8.6 [CVE-2023-3138]<br />====================================================</p><p>The functions in src/InitExt.c in libX11 prior to 1.8.6 do not check<br />that the values provided for the Request, Event, or Error IDs are<br />within the bounds of the arrays that those functions write to, using<br />those IDs as array indexes.&#160; Instead they trusted that they were called<br />with values provided by an Xserver that was adhering to the bounds<br />specified in the X11 protocol, as all X servers provided by X.Org do.</p><p>As the protocol only specifies a single byte for these values, an<br />out-of-bounds value provided by a malicious server (or a malicious<br />proxy-in-the-middle) can only overwrite other portions of the Display<br />structure and not write outside the bounds of the Display structure<br />itself.&#160; Testing has found it is possible to at least cause the client<br />to crash with this memory corruption.</p><p>This is fixed in:<br /><a href="https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/304a654a0d57bf0f00d8998185f0360332cfa36c" rel="nofollow">https://gitlab.freedesktop.org/xorg/lib … 0332cfa36c</a><br />which is included in the libX11 1.8.6 release issued today.</p><p>X.Org thanks Gregory James Duck for reporting this issue to our security team.</p><p>--<br />Alan Coopersmith - alan.coopersmith@oracle.com<br />X.Org Security Response Team - xorg-security@lists.x.org</p><p>-------------------------------------------------------------------------------------------</p><p>Best,</p><p>A.</p>]]></description>
			<author><![CDATA[dummy@example.com (Altoid)]]></author>
			<pubDate>Fri, 16 Jun 2023 01:45:26 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=42556#p42556</guid>
		</item>
	</channel>
</rss>
