In the X.Org X server, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events. Upstream patches: https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c https://cgit.freedesktop.org/xorg/xserver/commit/?id=8caed4df36b1f802b4992edcfd282cbeeec35d9d https://cgit.freedesktop.org/xorg/xserver/commit/?id=ba336b24052122b136486961c82deac76bbde455 References: https://bugzilla.suse.com/show_bug.cgi?id=1035283
Created xorg-x11-server tracking bugs for this issue: Affects: fedora-all [bug 1473206]
Since the Xorg server is compiled with Stack-smashing protection, it looks like executing arbitrary code in the context of the X-server (root) involves guessing the stack canary, which can be extremely difficult to pull, hence the maximum impact of this flaw is X-server crash.