Gentoo Archives: gentoo-announce

From: Sune Kloppenborg Jeppesen <jaervosz@g.o>
To: gentoo-announce@g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200605-02 ] X.Org: Buffer overflow in XRender extension
Date: Tue, 02 May 2006 18:49:18
Message-Id: 200605022014.58409.jaervosz@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200605-02
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: X.Org: Buffer overflow in XRender extension
9 Date: May 02, 2006
10 Bugs: #130979
11 ID: 200605-02
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 A buffer overflow in the XRender extension potentially allows any X.Org
19 user to execute arbitrary code with elevated privileges.
20
21 Background
22 ==========
23
24 X.Org is X.Org Foundation's public implementation of the X Window
25 System.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 x11-base/xorg-x11 < 6.8.2-r7 >= 6.8.2-r7
34
35 Description
36 ===========
37
38 X.Org miscalculates the size of a buffer in the XRender extension.
39
40 Impact
41 ======
42
43 An X.Org user could exploit this issue to make the X server execute
44 arbitrary code with elevated privileges.
45
46 Workaround
47 ==========
48
49 There is no known workaround at this time.
50
51 Resolution
52 ==========
53
54 All X.Org users should upgrade to the latest version:
55
56 # emerge --sync
57 # emerge --ask --oneshot --verbose ">=x11-base/xorg-x11-6.8.2-r7"
58
59 References
60 ==========
61
62 [ 1 ] CVE-2006-1526
63 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1526
64
65 Availability
66 ============
67
68 This GLSA and any updates to it are available for viewing at
69 the Gentoo Security Website:
70
71 http://security.gentoo.org/glsa/glsa-200605-02.xml
72
73 Concerns?
74 =========
75
76 Security is a primary focus of Gentoo Linux and ensuring the
77 confidentiality and security of our users machines is of utmost
78 importance to us. Any security concerns should be addressed to
79 security@g.o or alternatively, you may file a bug at
80 http://bugs.gentoo.org.
81
82 License
83 =======
84
85 Copyright 2006 Gentoo Foundation, Inc; referenced text
86 belongs to its owner(s).
87
88 The contents of this document are licensed under the
89 Creative Commons - Attribution / Share Alike license.
90
91 http://creativecommons.org/licenses/by-sa/2.0