xorg-server -- Multiple Issues

ID AB881A74-C016-4E6D-9F7D-68C8E7CEDAFB
Type freebsd
Reporter FreeBSD
Modified 2018-05-20T00:00:00


xorg-server developers reports:

In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. Uninitialized data in endianness conversion in the XEvent handling of the X.Org X Server before 2017-06-19 allowed authenticated malicious users to access potentially privileged data from the X server.