Bug 232996

Summary: CVE-2007-1003 xserver XC-MISC integer overflow
Product: Red Hat Enterprise Linux 3 Reporter: Josh Bressers <bressers>
Component: XFree86Assignee: Søren Sandmann Pedersen <sandmann>
Status: CLOSED ERRATA QA Contact: David Lawrence <dkl>
Severity: high Docs Contact:
Priority: medium    
Version: 3.0CC: kem, security-response-team, xgl-maint
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: impact=important,reported=20070216,embargo=20070403,source=vendorsec
Fixed In Version: RHSA-2007-0125 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2007-04-03 19:15:21 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
Poposed upstream patch none

Description Josh Bressers 2007-03-19 20:08:11 UTC
Sean Larsson, iDefense Labs, discovered an integer overflow flaw in the XC-MISC
extension.  This overflow could allow a local user to gain root privileges.

Comment 1 Josh Bressers 2007-03-19 20:08:39 UTC
This flaw also affects RHEL2.1

Comment 2 Josh Bressers 2007-03-19 20:10:32 UTC
Created attachment 150431 [details]
Poposed upstream patch

Comment 4 Søren Sandmann Pedersen 2007-03-20 21:34:28 UTC
2.1 is building. NVR: XFree86-4.1.0-80EL


Comment 5 Søren Sandmann Pedersen 2007-03-20 21:46:26 UTC
3 is building. NVR: XFree86-4.3.0-118_EL

http://brewweb.devel.redhat.com/brew/taskinfo?taskID=681192


Comment 8 Josh Bressers 2007-04-03 16:41:09 UTC
Lifting embargo.

Comment 9 Red Hat Bugzilla 2007-04-03 19:15:21 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2007-0125.html