SProcXCMiscGetXIDList() call in XC-MISC extension do not check that the lengths and/or indexes sent by the client are within the bounds specified by the caller or the bounds of the memory allocated to hold the request read from the client, so could read or write past the bounds of allocated memory while processing the request. These calls all occur only after a client has successfully authenticated itself. Introduced in X11R6.0 (1994).
Created attachment 962136 [details] 0009-xcmisc_unvalidated_length_in_SProcXCMiscGetXIDList_CVE-2014-8096.patch
Crash caused by OOB read via crafted data sent by authenticated client.
External References: http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
This issue has been addressed in the following products: Red Hat Enterprise Linux 5 Via RHSA-2014:1982 https://rhn.redhat.com/errata/RHSA-2014-1982.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Red Hat Enterprise Linux 6 Via RHSA-2014:1983 https://rhn.redhat.com/errata/RHSA-2014-1983.html