Date: Wed, 22 Aug 2018 15:15:20 -0700 From: Alan Coopersmith <alan.coopersmith@...cle.com> To: oss-security@...ts.openwall.com Subject: Fwd: X.Org security advisory: August 22, 2018 -------- Forwarded Message -------- Subject: X.Org security advisory: August 22, 2018 Date: Wed, 22 Aug 2018 15:06:55 -0700 From: Alan Coopersmith <alan.coopersmith@...cle.com> To: xorg-announce@...ts.x.org CC: xorg-devel@...ts.x.org X.Org security advisory: August 22, 2018 Out-of-bounds write in libXcursor prior to 1.1.15 ================================================= libXcursor could write one byte out of bounds when processing Xcursor theme files. In certain cases, such as when used in the Firefox web browser, this could be used as part of an exploit chain to allow further attacks on an X client process, as reported via Mozilla's ASan Nightly project. This issue has been assigned CVE-2015-9262. Patches ======= A patch for this issue was committed to the libXcursor git repository in 2015, and included in the libXcursor 1.1.15 release. https://gitlab.freedesktop.org/xorg/lib/libxcursor/commit/897213f36baf6926daf6d192c709cf627aa5fd05 Thanks ====== X.Org thanks Shubham Shrivastav of Samsung for reporting this issue to X.Org originally, and Alex Gaynor of Mozilla for helping us understand how this could be exploited by an attacker. -- -Alan Coopersmith- alan.coopersmith@...cle.com X.Org Security Response Team - xorg-security@...ts.x.org
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.