|Title||xorg-x11 security update|
|Name||RHSA-2005:198||First vendor Publication||2005-06-08|
|Vendor||RedHat||Last vendor Modification||2005-06-08|
Security-Database Scoring CVSS v2
|Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)|
|Cvss Base Score||7.5||Attack Range||Network|
|Cvss Impact Score||6.4||Attack Complexity||Low|
|Cvss Expoit Score||10||Authentification||None Required|
|Calculate full CVSS 2.0 Vectors scores|
Updated xorg-x11 packages that fix a security issue as well as various bugs
are now available for Red Hat Enterprise Linux 4.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS version 4 - i386, ia64, noarch, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, noarch, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, noarch, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, noarch, x86_64
3. Problem description:
X.Org X11 is the X Window System which provides the core functionality
of the Linux GUI desktop.
An integer overflow flaw was found in libXpm, which is used by some
applications for loading of XPM images. An attacker could create a
carefully crafted XPM file in such a way that it could cause an application
linked with libXpm to execute arbitrary code when the file was opened by a
victim. The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CAN-2005-0605 to this issue.
Since the initial release of Red Hat Enterprise Linux 4, a number of issues
have been addressed in the X.Org X11 X Window System. This erratum also
updates X11R6.8 to the latest stable point release (6.8.2), which includes
various stability and reliability fixes including (but not limited to) the
- - The 'radeon' driver has been modified to disable "RENDER" acceleration
by default, due to a bug in the implementation which has not yet
been isolated. This can be manually re-enabled by using the
following option in the device section of the X server config file:
- - The 'vmware' video driver is now available on 64-bit AMD64 and
- - The Intel 'i810' video driver is now available on 64-bit EM64T
- - Stability fixes in the X Server's PCI handling layer for 64-bit systems,
which resolve some issues reported by "vesa" and "nv" driver users.
- - Support for Hewlett Packard's Itanium ZX2 chipset.
- - Nvidia "nv" video driver update provides support for some of
the newer Nvidia chipsets, as well as many stability and reliability
- - Intel i810 video driver stability update, which fixes the widely
reported i810/i815 screen refresh issues many have experienced.
- - Packaging fixes for multilib systems, which permit both 32-bit
and 64-bit X11 development environments to be simultaneously installed
without file conflicts.
In addition to the above highlights, the X.Org X11 6.8.2 release has a
large number of additional stability fixes which resolve various other
issues reported since the initial release of Red Hat Enterprise Linux 4.
All users of X11 should upgrade to these updated packages, which resolve
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:
For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:
5. Bug IDs fixed (http://bugzilla.redhat.com/):
136941 - font corruption on openoffice.org menus
143910 - X is unusable on GeForce 6600GT with nForce4
150036 - CAN-2005-0605 XPM buffer overflow
157962 - xorg-x11-6.8.1-23 missing half of Lucida fonts
|Url : https://rhn.redhat.com/errata/RHSA-2005-198.html|
CPE : Common Platform Enumeration
Open Source Vulnerability Database (OSVDB)
|14373||libXpm XPM Image GetImagePixels() / PutImagePixels() Overflow|