Bug 445414 (CVE-2008-1379)

Summary: CVE-2008-1379 X.org MIT-SHM extension arbitrary memory read
Product: [Other] Security Response Reporter: Josh Bressers <bressers>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: airlied, kreilly, osoukup, security-response-team, zcerza
Target Milestone: ---Keywords: Reopened, Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: 1.4.99.902-3.20080612.fc9 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2008-06-14 05:39:36 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 445437, 445438, 445439, 445440, 445441, 445442, 445443, 450924, 450925, 450926, 450927    
Bug Blocks:    

Description Josh Bressers 2008-05-06 19:24:06 UTC
iDefense reported several flaws in the X.org MIT-SHM extension. The iDefense
advisory states:

    Local exploitation of an information disclosure vulnerability in the
    X.Org X server, as included in various vendors' operating system
    distributions, could allow an attacker to gain access to sensitive
    information stored in server memory.

    The vulnerability exists when creating a Pixmap in the fbShmPutImage()
    function. The width and height of the Pixmap, which are controlled by
    the user, are not properly validated to ensure that the Pixmap they
    define are within the bounds of the shared memory segment. This allows
    an attacker to read arbitrary areas of memory in the X Server process.

Comment 6 Tomas Hoger 2008-06-11 18:22:58 UTC
Public now:

  http://lists.freedesktop.org/archives/xorg/2008-June/036026.html

Comment 8 Fedora Update System 2008-06-12 06:04:59 UTC
xorg-x11-server-1.4.99.902-3.20080612.fc9 has been submitted as an update for Fedora 9

Comment 9 Tomas Hoger 2008-06-12 08:50:23 UTC
iDefense advisory:

  http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=722

Comment 10 Fedora Update System 2008-06-13 02:18:12 UTC
xorg-x11-server-1.4.99.902-3.20080612.fc9 has been pushed to the Fedora 9 testing repository.  If problems still persist, please make note of it in this bug report.
 If you want to test the update, you can install it with 
 su -c 'yum --enablerepo=updates-testing update xorg-x11-server'.  You can provide feedback for this update here: http://admin.fedoraproject.org/updates/F9/FEDORA-2008-5254

Comment 11 Fedora Update System 2008-06-13 02:23:46 UTC
xorg-x11-server-1.3.0.0-17.fc7 has been pushed to the Fedora 7 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 12 Fedora Update System 2008-06-14 04:15:15 UTC
xorg-x11-server-1.4.99.902-3.20080612.fc9 has been pushed to the Fedora 9 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 13 Fedora Update System 2008-06-14 04:19:09 UTC
xorg-x11-server-1.3.0.0-46.fc8 has been pushed to the Fedora 8 stable repository.  If problems still persist, please make note of it in this bug report.