Bugtraq mailing list archives
[ GLSA 200701-25 ] X.Org X server: Multiple vulnerabilities
From: Matthias Geerdsen <vorlon () gentoo org>
Date: Sat, 27 Jan 2007 20:30:40 +0100
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200701-25 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: X.Org X server: Multiple vulnerabilities Date: January 27, 2007 Bugs: #157421 ID: 200701-25 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Sean Larsson from iDefense Labs has found multiple vulnerabilities in the DBE and Render extensions. Background ========== The X Window System is a graphical windowing system based on a client/server model. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 x11-base/xorg-server < 1.1.1-r4 >= 1.1.1-r4 Description =========== Multiple memory corruption vulnerabilities have been found in the ProcDbeGetVisualInfo() and the ProcDbeSwapBuffers() of the DBE extension, and ProcRenderAddGlyphs() in the Render extension. Impact ====== A local attacker could execute arbitrary code with the privileges of the user running the X server, typically root. Workaround ========== Disable the dbe and render extension by removing the "Load dbe" and "Load render" directives in the Module section of xorg.conf. Note: This could affect the functionality of some applications. Resolution ========== All X.Org X server users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=x11-base/xorg-server-1.1.1-r4" References ========== [ 1 ] CVE-2006-6101 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6101 [ 2 ] CVE-2006-6102 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6102 [ 3 ] CVE-2006-6103 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6103 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200701-25.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security () gentoo org or alternatively, you may file a bug at http://bugs.gentoo.org. License ======= Copyright 2007 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5
Attachment:
signature.asc
Description: OpenPGP digital signature
Current thread:
- [ GLSA 200701-25 ] X.Org X server: Multiple vulnerabilities Matthias Geerdsen (Jan 29)