[LWN Logo]
[LWN.net]
From: "Andrew van der Stock" <ajv@greebo.net>
To: <lwn@lwn.net>
Subject: Xfree86 Security Fixes
Date: Tue, 20 Mar 2001 10:59:45 +1100

Hi Liz,

just a quick note to follow up your article on XFree86's security issues
from last October:
http://lwn.net/2000/1026/security.php3

I'd advise all your readers to move to Xfree86 4.0.3 as it is the fastest,
most stable, and definitely most secure version of XFree86.

Chris Evans had pointed out the following issues:

- X server DoS in XCSECURITY authentication code
	Fixed in 4.0.1
- libICE DoS
	Fixed in 4.0.1
- CPU DoS in XOpenDisplay
	Fixed in 4.0.2
- (I think) A malloc() error in XOpenDisplay
	Fixed in 4.0.2
- A nasty stack corruption bug in the event handling
	[Not enough information to fix this one]

In addition, the following security fixes are in 4.0.3:

1217. [SECURITY] Fix temp files vulnerabilites in xman on systems with
      mkstemp(). (Matthieu Herrb).
1216. [SECURITY] Fix temp vulnerabilities in Xaw/MultiSrc.c using the
technique
      in patch #4279 (Branden Robinson). Fix temp file vulnerability in
      gccmakedep based on report from Alan Cox. Fix temp file vulnerability
      in Imake.rules, InstallManPageAliases (Matthieu Herrb).

I'd just like to point out the great work done by Branden Robinson, Matthieu
Herrb, and David Dawes in getting these fixes done.

Moral to story: unless you have a card that is not supported by 4.0.3, it's
time to ditch 3.3.x. If you have a card that is not supported by 4.0.x,
please help us bring it forward.

Andrew van der Stock
ajv@greebo.net