News: 0000827701

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

X.org security fixes address potential ASLR bypass, heap corruption

([Security] Jul 31, 2020 17:38 UTC (Fri) (coogle))


The X.Org project has announced two security advisories that impact Xserver and libX11. The [1]first advisory for X server is regarding uninitialized memory in AllocatePixmap() that could lead to [2]address space layout randomization bypass . [3]The second , impacting libX11, is a heap corruption caused by integer overflows and signed/unsigned comparisons.



[1] https://lwn.net/Articles/827704

[2] https://en.wikipedia.org/wiki/Address_space_layout_randomization

[3] https://lwn.net/Articles/827705

If you put tomfoolery into a computer, nothing comes out but tomfoolery.
But this tomfoolery, having passed through a very expensive machine,
is somehow ennobled and no-one dare criticise it.
-- Pierre Gallois