Gentoo Archives: gentoo-announce

From: Daniel Ahlberg <aliz@g.o>
To: gentoo-announce@g.o
Subject: [gentoo-announce] GLSA: xfree
Date: Thu, 24 Oct 2002 04:58:15
Message-Id: 20021024095813.4ED213368D@mail1.tamperd.net
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - --------------------------------------------------------------------
5 GENTOO LINUX SECURITY ANNOUNCEMENT 200210-006
6 - - --------------------------------------------------------------------
7
8 PACKAGE : xfree
9 SUMMARY : Shared memory may be compromised by local XFree86 users
10 DATE    : 2002-10-24 10:00 UTC
11 EXPLOIT : local
12
13 - - --------------------------------------------------------------------
14
15 Roberto Zunino discovered a vulnerability in the MIT-SHM extension of
16 XFree86 prior to versions 4.2.1. The vulnerability allows a local
17 user who can run XFree86 to gain read/write access to any shared
18 memory segment in the system. Although the use of shared memory
19 segments to store trusted data is not a common practice, by
20 exploiting this vulnerability the attacker potentially can get and/or
21 change sensitive information.
22
23 SOLUTION
24
25 It is recommended that all Gentoo Linux users who are running
26 x11-base/xfree-4.2.0-r12 and earlier update their systems
27 as follows:
28
29 emerge rsync
30 emerge xfree
31 emerge clean
32
33 - - --------------------------------------------------------------------
34 aliz@g.o - GnuPG key is available at www.gentoo.org/~aliz
35 - - --------------------------------------------------------------------
36 -----BEGIN PGP SIGNATURE-----
37 Version: GnuPG v1.2.0 (GNU/Linux)
38
39 iD8DBQE9t8Q0fT7nyhUpoZMRAhNtAJ9LVe8VAj8cSWvNfreoZcBgdMewvACgwy64
40 cSJNZmLWeKfcol6ah9xIYQ8=
41 =fEUk
42 -----END PGP SIGNATURE-----