Bug 413721 (CVE-2007-6429)
Summary: | CVE-2007-6429 xorg / xfree86: integer overflow in EVI extension | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Tomas Hoger <thoger> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | airlied, ajax, kreilly, security-response-team, tyan, xgl-maint |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | 1.3.0.0-39.fc8 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2008-01-22 15:31:47 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 419451, 419461, 419481, 419501, 419521, 419531, 429125, 429126, 429127 | ||
Bug Blocks: |
Description
Tomas Hoger
2007-12-06 10:29:12 UTC
Upstream bug report: https://bugs.freedesktop.org/show_bug.cgi?id=13519 CVE id CVE-2007-6429 is used to cover integer overflows in both EVI and MIT-SHM extensions. MIT-SHM extension issue is tracked via bug #413741. Lifting embargo: http://lists.freedesktop.org/archives/xorg/2008-January/031918.html There have been reports from other distributions that the fix for this issue causes problems with some applications. See for example: https://bugs.launchpad.net/ubuntu/+bug/183969 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=461410 Our engineers are currently investigating this issue. It is currently believed that a work-around that can be used with these new packages is to disable the mitshm extension, see http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=461410#26 Status update: Our engineers have a patch for this issue. Updated packages are being built and will go through an expedited process for release as soon as they are ready. As the patches were security complete, the updated patches do not fix a security regression. As such we intend to release the updated packages in their original RHSA errata with a bumped advisory revision. [Updated 18th January 2008] The original packages distributed with this errata had a bug which could cause some X applications to fail on 32-bit platforms. We have updated the packages to correct this bug. http://rhn.redhat.com/errata/RHSA-2008-0031.html http://rhn.redhat.com/errata/RHSA-2008-0030.html http://rhn.redhat.com/errata/RHSA-2008-0029.html xorg-x11-server-1.3.0.0-39.fc8 has been pushed to the Fedora 8 stable repository. If problems still persist, please make note of it in this bug report. xorg-x11-server-1.3.0.0-15.fc7 has been pushed to the Fedora 7 stable repository. If problems still persist, please make note of it in this bug report. This issue was addressed in: Red Hat Enterprise Linux: http://rhn.redhat.com/errata/RHSA-2008-0031.html http://rhn.redhat.com/errata/RHSA-2008-0030.html http://rhn.redhat.com/errata/RHSA-2008-0029.html Fedora: https://admin.fedoraproject.org/updates/F7/FEDORA-2008-0831 https://admin.fedoraproject.org/updates/F8/FEDORA-2008-0760 |