|
Message-ID: <4F8F5DCD.600@redhat.com> Date: Wed, 18 Apr 2012 18:35:25 -0600 From: Kurt Seifried <kseifried@...hat.com> To: oss-security@...ts.openwall.com CC: Kees Cook <keescook@...omium.org> Subject: Re: CVE request: Xorg input device format string flaw -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 04/18/2012 02:37 PM, Kees Cook wrote: > On Wed, Apr 18, 2012 at 1:23 PM, Kurt Seifried > <kseifried@...hat.com> wrote: >> On 04/18/2012 01:28 PM, Kees Cook wrote: >>> Hello, >>> >>> Adding an input device with a malicious name can trigger a >>> format string flaw in Xorg's logging subsystem. For builds of >>> Xorg lacking -D_FORTIFY_SOURCE=2 (or 32-bit systems lacking the >>> fix to fortify[1]) this can lead to arbitrary code execution as >>> the Xorg user, usually root. When built with fortify, this is a >>> denial of service, since Xorg will abort. >>> >>> Proposed solution patch series can be found here: 1/4 >>> http://patchwork.freedesktop.org/patch/10000/ 2/4 >>> http://patchwork.freedesktop.org/patch/9998/ 3/4 >>> http://patchwork.freedesktop.org/patch/9999/ 4/4 >>> http://patchwork.freedesktop.org/patch/10001/ >>> >>> -Kees >>> >>> [1] >>> http://sourceware.org/git/?p=glibc.git;a=commitdiff;h=7c1f4834d398163d1ac8101e35e9c36fc3176e6e >> >> >>> So >>> >> are you asking for just the device name issue covered in >> >> http://patchwork.freedesktop.org/patch/10001/ Please use CVE-2012-2118 for this issue (Xorg device name logging format string). > Yeah, but I wanted to point to the entire patch series, since that > fix, I think, depends on pieces from the others. > > -Kees Ok, it's just that some of them have other somewhat security sounding issues (I haven't looked in depth though, was hoping you had). - -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQIcBAEBAgAGBQJPj13NAAoJEBYNRVNeJnmTcg8P/0nmtqjjZpKKWfHK4vdcPtut 6Ue/W0/QqDJi2riiB+4pe4QEezK5X27QmsH4pfqEWuk/0ykF9Dj1MKae3/bhT2wg zem/cKRHnS3/iprqWZrHhfvPoIi1oSl8nvjJImjfCMUGi1gZhdZDTYqP4MLbtvG7 +4TbWzeSxxDlOhW6iM70qIbxjuB1guh3DE1pjICjKev9GvfzU6vTkoYYGvq3ZFUQ warDFqYo1PxOVcWj96JCIQMpywr5vBIypg3ZmTVVWZgfRiE0Ub/1fstaICK0E9IV n+C9PNxwUOPGLAo+X1Mpj5kC7QutPvJ4zyOSHZBBFmUlW2arcXhC08MJb+zO/aXd +kqzPnVWEuemqtfAbpELDYoKils5V1PG2ZNgd6rbabg6LHW795Db1UtGjvrU9Wb9 YZgcD+yA3VqCdwHHSPY/w8ek3BUSQmR7jveAI7ZLdnMPdgV070hMkA8PxRhI7So2 h3Riv2ySBH22ejZwNAJ0A18T7wBEn0u+KEvt7v91NwG5tLDtSBn7Kk+kvo2BvBz5 6o3rh7GOFTPOR49wyMaUNHTN5C+LmcSY9mGYxX+mpJLZU68fn43YFbdWu2kRagQ0 7OQSCg2ycXaR8bhtsudMuUCbWMgKo+Snvd2KCNE6AbCEyMnMDjvztff9Vpe7pCaZ iWjfpsj6EXWwvgQzebg5 =TT32 -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.