Adding an input device with a malicious name can trigger a format
string flaw in Xorg's logging subsystem. For builds of Xorg lacking
-D_FORTIFY_SOURCE=2 (or 32-bit systems lacking the fix to fortify[1])
this can lead to arbitrary code execution as the Xorg user, usually
root. When built with fortify, this is a denial of service, since Xorg
will abort.
Adding an input device with a malicious name can trigger a format
string flaw in Xorg's logging subsystem. For builds of Xorg lacking
-D_FORTIFY_SOURCE=2 (or 32-bit systems lacking the fix to fortify[1])
this can lead to arbitrary code execution as the Xorg user, usually
root. When built with fortify, this is a denial of service, since Xorg
will abort.
Proposed solution patch series can be found here: patchwork. freedesktop. org/patch/ 10000/ patchwork. freedesktop. org/patch/ 9998/ patchwork. freedesktop. org/patch/ 9999/ patchwork. freedesktop. org/patch/ 10001/
1/4 http://
2/4 http://
3/4 http://
4/4 http://
-Kees
[1] http:// sourceware. org/git/ ?p=glibc. git;a=commitdif f;h=7c1f4834d39 8163d1ac8101e35 e9c36fc3176e6e