![]() |
|
Message-ID: <CAP=2yyTF2ZewE+QOdmwFL+oc-gmFrWF56DnRHPBS9r9E8ON7Zw@mail.gmail.com> Date: Wed, 18 Jun 2025 18:04:35 +0200 From: Olivier Fourdan <ofourdan@...hat.com> To: oss-security@...ts.openwall.com Subject: Fwd: X.Org Security Advisory: multiple security issues X.Org X server and Xwayland Addendum to yesterday's X.Org Security Advisory for CVE-2025-49176: On 17/06/2025 15:43, Olivier Fourdan wrote: > [...] > ====================================================================== > > 2) CVE-2025-49176: Integer overflow in Big Requests Extension > > The Big Requests extension allows requests larger than the 16-bit length > limit. > > It uses integers for the request length and checks for the size not to > exceed the maxBigRequestSize limit, but does so after translating the > length to integer by multiplying the given size in bytes by 4. > > In doing so, it might overflow the integer size limit before actually > checking for the overflow, defeating the purpose of the test. > > Introduced in: X11R6.0 > Fixed in: xorg-server-21.1.17 and xwayland-24.1.7 > Fix: https://gitlab.freedesktop.org/xorg/xserver/-/commit/03731b32 > Found by: This issue was discovered by Nils Emmerich and reported by > Julian Suleder via ERNW Vulnerability Disclosure. There is another case where the BigRequest length can cause an overflow, so that requires an additional fix: Fix: https://gitlab.freedesktop.org/xorg/xserver/-/commit/4fc4d76b Thanks to Peter Harris for pointing this out. A fix will be issued in xorg-server-21.1.18 and xwayland-24.1.8 shortly.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.