Bug 448784 (CVE-2008-2361) - CVE-2008-2361 X.org Render extension ProcRenderCreateCursor() crash
Summary: CVE-2008-2361 X.org Render extension ProcRenderCreateCursor() crash
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2008-2361
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 445438 445439 445440 445442 445443 450924 450925 450926 450927
Blocks: 445408
TreeView+ depends on / blocked
 
Reported: 2008-05-28 19:33 UTC by Josh Bressers
Modified: 2022-05-16 10:19 UTC (History)
2 users (show)

Fixed In Version: 1.4.99.902-3.20080612.fc9
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2008-06-14 05:41:03 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2008:0502 0 normal SHIPPED_LIVE Important: XFree86 security update 2008-06-11 19:26:38 UTC
Red Hat Product Errata RHSA-2008:0503 0 normal SHIPPED_LIVE Important: xorg-x11 security update 2008-06-11 18:50:34 UTC
Red Hat Product Errata RHSA-2008:0504 0 normal SHIPPED_LIVE Important: xorg-x11-server security update 2008-06-11 19:34:55 UTC

Description Josh Bressers 2008-05-28 19:33:47 UTC
+++ This bug was initially created as a clone of Bug #445408 +++

iDefense reported several flaws in the X.org Render extension.  The iDefense
advisory states:

    Multiple vulnerabilities are present in the Render extension in the
    code responsible for reading in client requests. The following
    function contains the vulnerability:

    ProcRenderCreateCursor()

    In each case, values are taken from the client request and used in
    arithmetic operations that calculate the size of dynamic buffers. These
    calculations can overflow, which results in undersized buffers being
    allocated. The allocated buffers are then overflowed with data from the
    client request.

Comment 2 Tomas Hoger 2008-06-11 18:24:08 UTC
Public now:

  http://lists.freedesktop.org/archives/xorg/2008-June/036026.html

Comment 4 Fedora Update System 2008-06-12 06:05:01 UTC
xorg-x11-server-1.4.99.902-3.20080612.fc9 has been submitted as an update for Fedora 9

Comment 5 Tomas Hoger 2008-06-12 08:54:26 UTC
iDefense advisory:

  http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=719

Comment 6 Fedora Update System 2008-06-13 02:18:08 UTC
xorg-x11-server-1.4.99.902-3.20080612.fc9 has been pushed to the Fedora 9 testing repository.  If problems still persist, please make note of it in this bug report.
 If you want to test the update, you can install it with 
 su -c 'yum --enablerepo=updates-testing update xorg-x11-server'.  You can provide feedback for this update here: http://admin.fedoraproject.org/updates/F9/FEDORA-2008-5254

Comment 7 Fedora Update System 2008-06-13 02:23:56 UTC
xorg-x11-server-1.3.0.0-17.fc7 has been pushed to the Fedora 7 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 8 Fedora Update System 2008-06-14 04:15:10 UTC
xorg-x11-server-1.4.99.902-3.20080612.fc9 has been pushed to the Fedora 9 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 9 Fedora Update System 2008-06-14 04:19:05 UTC
xorg-x11-server-1.3.0.0-46.fc8 has been pushed to the Fedora 8 stable repository.  If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.