![[LWN Logo]](/images/lcorner.png) |
|
![[LWN.net]](/images/Included.png) |
From: "Andrew van der Stock" <ajv@greebo.net>
To: <lwn@lwn.net>
Subject: Xfree86 Security Fixes
Date: Tue, 20 Mar 2001 10:59:45 +1100
Hi Liz,
just a quick note to follow up your article on XFree86's security issues
from last October:
http://lwn.net/2000/1026/security.php3
I'd advise all your readers to move to Xfree86 4.0.3 as it is the fastest,
most stable, and definitely most secure version of XFree86.
Chris Evans had pointed out the following issues:
- X server DoS in XCSECURITY authentication code
Fixed in 4.0.1
- libICE DoS
Fixed in 4.0.1
- CPU DoS in XOpenDisplay
Fixed in 4.0.2
- (I think) A malloc() error in XOpenDisplay
Fixed in 4.0.2
- A nasty stack corruption bug in the event handling
[Not enough information to fix this one]
In addition, the following security fixes are in 4.0.3:
1217. [SECURITY] Fix temp files vulnerabilites in xman on systems with
mkstemp(). (Matthieu Herrb).
1216. [SECURITY] Fix temp vulnerabilities in Xaw/MultiSrc.c using the
technique
in patch #4279 (Branden Robinson). Fix temp file vulnerability in
gccmakedep based on report from Alan Cox. Fix temp file vulnerability
in Imake.rules, InstallManPageAliases (Matthieu Herrb).
I'd just like to point out the great work done by Branden Robinson, Matthieu
Herrb, and David Dawes in getting these fixes done.
Moral to story: unless you have a card that is not supported by 4.0.3, it's
time to ditch 3.3.x. If you have a card that is not supported by 4.0.x,
please help us bring it forward.
Andrew van der Stock
ajv@greebo.net