Gentoo Archives: gentoo-announce

From: Matthias Geerdsen <vorlon@g.o>
To: gentoo-announce@g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200701-25 ] X.Org X server: Multiple vulnerabilities
Date: Sat, 27 Jan 2007 19:50:22
Message-Id: 45BBA860.6060505@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200701-25
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: X.Org X server: Multiple vulnerabilities
9 Date: January 27, 2007
10 Bugs: #157421
11 ID: 200701-25
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Sean Larsson from iDefense Labs has found multiple vulnerabilities in
19 the DBE and Render extensions.
20
21 Background
22 ==========
23
24 The X Window System is a graphical windowing system based on a
25 client/server model.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 x11-base/xorg-server < 1.1.1-r4 >= 1.1.1-r4
34
35 Description
36 ===========
37
38 Multiple memory corruption vulnerabilities have been found in the
39 ProcDbeGetVisualInfo() and the ProcDbeSwapBuffers() of the DBE
40 extension, and ProcRenderAddGlyphs() in the Render extension.
41
42 Impact
43 ======
44
45 A local attacker could execute arbitrary code with the privileges of
46 the user running the X server, typically root.
47
48 Workaround
49 ==========
50
51 Disable the dbe and render extension by removing the "Load dbe" and
52 "Load render" directives in the Module section of xorg.conf.
53
54 Note: This could affect the functionality of some applications.
55
56 Resolution
57 ==========
58
59 All X.Org X server users should upgrade to the latest version:
60
61 # emerge --sync
62 # emerge --ask --oneshot --verbose ">=x11-base/xorg-server-1.1.1-r4"
63
64 References
65 ==========
66
67 [ 1 ] CVE-2006-6101
68 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6101
69 [ 2 ] CVE-2006-6102
70 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6102
71 [ 3 ] CVE-2006-6103
72 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6103
73
74 Availability
75 ============
76
77 This GLSA and any updates to it are available for viewing at
78 the Gentoo Security Website:
79
80 http://security.gentoo.org/glsa/glsa-200701-25.xml
81
82 Concerns?
83 =========
84
85 Security is a primary focus of Gentoo Linux and ensuring the
86 confidentiality and security of our users machines is of utmost
87 importance to us. Any security concerns should be addressed to
88 security@g.o or alternatively, you may file a bug at
89 http://bugs.gentoo.org.
90
91 License
92 =======
93
94 Copyright 2007 Gentoo Foundation, Inc; referenced text
95 belongs to its owner(s).
96
97 The contents of this document are licensed under the
98 Creative Commons - Attribution / Share Alike license.
99
100 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature