X.org security fixes address potential ASLR bypass, heap corruption

Post Syndicated from coogle original https://lwn.net/Articles/827701/rss

The X.Org project has announced two security advisories that impact Xserver and libX11. The first advisory for X server is regarding uninitialized memory in AllocatePixmap() that could lead to address space layout randomization bypass. The second, impacting libX11, is a heap corruption caused by integer overflows and signed/unsigned comparisons.