Bug 168264
Summary: | CAN-2005-0605, CAN-2005-2495 XFree86/Xorg - libXpm & other multiple integer overflows | ||
---|---|---|---|
Product: | [Retired] Fedora Legacy | Reporter: | David Eisenstein <deisenst> |
Component: | XFree86 | Assignee: | Fedora Legacy Bugs <bugs> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | dom, pekkas, security-response-team, xgl-maint |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugs.freedesktop.org/show_bug.cgi?id=594 | ||
Whiteboard: | LEGACY, rh73, rh90, 1, 2 | ||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2006-03-07 23:31:16 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
David Eisenstein
2005-09-14 06:30:31 UTC
I am certain this affects Fedora Core 2 (which uses X.org), and believe this vulnerability also affects FC1, Red Hat Linux 9, and Red Hat Linux 7.3. There are some test available in Freedesktop.org's Bug report that may allow users of FC1, RH9, and RH7.3 to check their versions and see if/how they are affected. Is Fedora Legacy project going to actually include this fix, or can we just close the bug report "WONTFIX" with explanation to upgrade to FC4? I am responding to comment 2's writer outside of Bugzilla, for now. Latest X sources likely affected by this security issue: Distro Size Date Source Package ------ ---------- ------------ ------------------------------------- RH7.3: 57964519 Feb 01 2005 XFree86-4.2.1-16.73.30.legacy.src.rpm RH9: 66897306 Feb 02 2005 XFree86-4.3.0-2.90.60.legacy.src.rpm FC1: 66897069 Feb 02 2005 XFree86-4.3.0-59.legacy.src.rpm FC2: 54599063 Mar 29 16:50 xorg-x11-6.7.0-14.src.rpm Red Hat has issued errata announcements that fix this issue: * RHSA-2005:501-01 for XFree86 (for RHEL3) XFree86-4.3.0-95.EL.src.rpm http://rhn.redhat.com/errata/RHSA-2005-501.html * RHSA-2005:396-01 for X.org (for RHEL4) xorg-x11-6.8.2-1.EL.13.16.src.rpm http://rhn.redhat.com/errata/RHSA-2005-396.html * FEDORA-2005-893 for X.org, updated by FEDORA-2005-914 (for FC3) xorg-x11-6.8.2-1.FC3.45.2.src.rpm http://www.redhat.com/archives/fedora-announce-list/2005-September/msg00085.html * FEDORA-2005-894 for X.org, updated by FEDORA-2005-904 (for FC4) xorg-x11-6.8.2-37.FC4.49.2.src.rpm http://www.redhat.com/archives/fedora-announce-list/2005-September/msg00077.html I am just now noticing Bug 153990 is open for the XFree86 issue CAN-2005-0605. Have suggested there that we close that bug as DUPLICATE of this bug so we can proceed to work on XFree86/xorg bugs here. Note that XFree86-4.3.0-81.EL.src.rpm (for RHEL3) was issued for CAN-2005-0605, so XFree86-4.3.0-95.EL.src.rpm should contain fixes for both that CVE and for CAN-2005-2495. We may have to backport those fixes for RedHat Linux 7.3 Updating this bug's title to indicate the multiple CVE's to be worked on here. Soon, I hope! :-) Ah, RHSA-2005:501-01 XFree86-4.3.0-95.EL.src.rpm has been superseded by RHBA-2005:787-5 XFree86-4.3.0-97.EL.src.rpm. http://rhn.redhat.com/errata/RHBA-2005-787.html -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Here are updated XFree86/xorg packages to QA: Changelog: * Sun Feb 12 2006 Marc Deslauriers <marcdeslauriers> 4.2.1-16.73.31.legacy - - Add XFree86-4.1.0-xpm-security-fix-CAN-2005-0605.patch. - - Add XFree86-4.3.0-security-CAN-2005-2495.patch to fix various integer overflows. 5d7e4958f28347292d249328e82f00260cda0c9f 7.3/XFree86-4.2.1-16.73.31.legacy.src.rpm b7be065ec6e6f9006387b89b30b18c0b3a07972f 9/XFree86-4.3.0-2.90.61.legacy.src.rpm 2b8485c5a109e5d01759e2aadbe1f23ea751e89a 1/XFree86-4.3.0-60.legacy.src.rpm 0bc44a52286f25201379e386cda80dbabf664199 2/xorg-x11-6.7.0-14.1.legacy.src.rpm http://www.infostrategique.com/linuxrpms/legacy/7.3/XFree86-4.2.1-16.73.31.legacy.src.rpm http://www.infostrategique.com/linuxrpms/legacy/9/XFree86-4.3.0-2.90.61.legacy.src.rpm http://www.infostrategique.com/linuxrpms/legacy/1/XFree86-4.3.0-60.legacy.src.rpm http://www.infostrategique.com/linuxrpms/legacy/2/xorg-x11-6.7.0-14.1.legacy.src.rpm -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) iD8DBQFD8Rb2LMAs/0C4zNoRAlCjAJ9mYZNmoGXa05PKUJU0q8eZuhdDtgCcDE3x XhjDktVCygjrx7LuS+KczYA= =My9S -----END PGP SIGNATURE----- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 QA w/ rpm-build-compare.sh: - source integrity OK - spec file changes minimal - patches verified to come from RHEL +PUBLISH RHL73, RHL9, FC1, FC2 5d7e4958f28347292d249328e82f00260cda0c9f XFree86-4.2.1-16.73.31.legacy.src.rpm b7be065ec6e6f9006387b89b30b18c0b3a07972f XFree86-4.3.0-2.90.61.legacy.src.rpm 2b8485c5a109e5d01759e2aadbe1f23ea751e89a XFree86-4.3.0-60.legacy.src.rpm 0bc44a52286f25201379e386cda80dbabf664199 xorg-x11-6.7.0-14.1.legacy.src.rpm -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQFD8YnTGHbTkzxSL7QRAqcmAJ9LeUFQ8Ul9iFWikFDnfQSaLZq9qwCgovV8 NOvNczpmY9/6YOe4632idAg= =zymG -----END PGP SIGNATURE----- *** Bug 153990 has been marked as a duplicate of this bug. *** Packages were pushed to updates-testing. Timeout over. Packages were released to updates. |