Insufficient checks on the lengths of the XInput extension ChangeFeedbackControl request can lead to out of bounds memory accesses in the X server. These issues can lead to privilege escalation for authorized clients on systems where the X server is running privileged. Fixed in 7aaf54a (included in version 1.20.11).
Unable to check for sanity: > disallowed package spec (only = allowed): <x11-base/xorg-server-1.20.11
Unable to check for sanity: > no match for package: x11-base/xorg-server-1.20.10
Thanks for the report! @x11, please proceed with stabilization when ready.
Good to go!
arm64 done
arm done
x86 done
amd64 done
ppc64 done
sparc stable
ppc done all arches done
Please cleanup.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=18023eacab3717be38b9f88ffeb0bebf5ee81f56 commit 18023eacab3717be38b9f88ffeb0bebf5ee81f56 Author: Thomas Deutschmann <whissi@gentoo.org> AuthorDate: 2021-04-30 21:48:39 +0000 Commit: Thomas Deutschmann <whissi@gentoo.org> CommitDate: 2021-04-30 21:48:48 +0000 x11-base/xorg-server: security cleanup Bug: https://bugs.gentoo.org/782679 Package-Manager: Portage-3.0.18, Repoman-3.0.3 Signed-off-by: Thomas Deutschmann <whissi@gentoo.org> x11-base/xorg-server/Manifest | 1 - x11-base/xorg-server/xorg-server-1.20.10-r2.ebuild | 227 --------------------- x11-base/xorg-server/xorg-server-1.20.10-r3.ebuild | 225 -------------------- 3 files changed, 453 deletions(-)
New GLSA request filed.
This issue was resolved and addressed in GLSA 202104-02 at https://security.gentoo.org/glsa/202104-02 by GLSA coordinator Thomas Deutschmann (whissi).