Gentoo Archives: gentoo-announce

From: Pierre-Yves Rofes <py@g.o>
To: gentoo-announce@l.g.o
Cc: full-disclosure@××××××××××××××.uk, bugtraq@×××××××××××××.com, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200710-16 ] X.Org X server: Composite local privilege escalation
Date: Sun, 14 Oct 2007 23:06:51
Message-Id: 47129A63.4060602@gentoo.org
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
5 Gentoo Linux Security Advisory GLSA 200710-16
6 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
7 http://security.gentoo.org/
8 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
9
10 Severity: High
11 Title: X.Org X server: Composite local privilege escalation
12 Date: October 14, 2007
13 Bugs: #191964
14 ID: 200710-16
15
16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
17
18 Synopsis
19 ========
20
21 A vulnerability has been discovered in the Composite extension of the
22 X.Org X server, allowing for a local privilege escalation.
23
24 Background
25 ==========
26
27 The X Window System is a graphical windowing system based on a
28 client/server model.
29
30 Affected packages
31 =================
32
33 -------------------------------------------------------------------
34 Package / Vulnerable / Unaffected
35 -------------------------------------------------------------------
36 1 x11-base/xorg-server < 1.3.0.0-r1 >= 1.3.0.0-r1
37
38 Description
39 ===========
40
41 Aaron Plattner discovered a buffer overflow in the compNewPixmap()
42 function when copying data from a large pixel depth pixmap into a
43 smaller pixel depth pixmap.
44
45 Impact
46 ======
47
48 A local attacker could execute arbitrary code with the privileges of
49 the user running the X server, typically root.
50
51 Workaround
52 ==========
53
54 Disable the Composite extension by setting ' Option "Composite"
55 "disable" ' in the Extensions section of xorg.conf.
56
57 Note: This could affect the functionality of some applications.
58
59 Resolution
60 ==========
61
62 All X.Org X server users should upgrade to the latest version:
63
64 # emerge --sync
65 # emerge --ask --oneshot --verbose ">=x11-base/xorg-server-1.3.0.0-r1"
66
67 References
68 ==========
69
70 [ 1 ] CVE-2007-4730
71 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4730
72
73 Availability
74 ============
75
76 This GLSA and any updates to it are available for viewing at
77 the Gentoo Security Website:
78
79 http://security.gentoo.org/glsa/glsa-200710-16.xml
80
81 Concerns?
82 =========
83
84 Security is a primary focus of Gentoo Linux and ensuring the
85 confidentiality and security of our users machines is of utmost
86 importance to us. Any security concerns should be addressed to
87 security@g.o or alternatively, you may file a bug at
88 http://bugs.gentoo.org.
89
90 License
91 =======
92
93 Copyright 2007 Gentoo Foundation, Inc; referenced text
94 belongs to its owner(s).
95
96 The contents of this document are licensed under the
97 Creative Commons - Attribution / Share Alike license.
98
99 http://creativecommons.org/licenses/by-sa/2.5
100 -----BEGIN PGP SIGNATURE-----
101 Version: GnuPG v1.4.7 (GNU/Linux)
102 Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
103
104 iD8DBQFHEppiuhJ+ozIKI5gRAmOeAJ46xK+4nH8LWGxbNmnlmPrltBqsHgCfUTNK
105 8qUzM6SvnXk2c2yZgp50GTk=
106 =DiOR
107 -----END PGP SIGNATURE-----
108 --
109 gentoo-announce@g.o mailing list