On Thu, 29 Aug 1996, Marek Michalkiewicz wrote:

> Package: xlib
> Version: 3.1.2-7
> 
> It seems there is a buffer overrun in libXt, which may be a security
> hole (some programs using libXt, such as xterm, are setuid root).
> I haven't tried to exploit it, but xterm -fg very_long_string
> segfaults, so it might be exploitable (stack overwrite).  See the
> attached message (which appeared on the bugtraq list) for a patch.

I'm currently trying to clear some of Steve Early's backlog of X
package bugs; this'll be among them (though it may be a while longer
before the packages get converted to the new source format.)

(S)


Reply via email to