Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 105688 - x11-base/xorg-x11 buffer overflow (CAN-2005-2495)
Summary: x11-base/xorg-x11 buffer overflow (CAN-2005-2495)
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High blocker (vote)
Assignee: Gentoo Security
URL: https://bugs.freedesktop.org/show_bug...
Whiteboard: B0? [glsa]
Keywords:
: 103737 (view as bug list)
Depends on:
Blocks:
 
Reported: 2005-09-12 07:10 UTC by Thierry Carrez (RETIRED)
Modified: 2005-09-12 16:49 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Thierry Carrez (RETIRED) gentoo-dev 2005-09-12 07:10:00 UTC
An integer overflow in pixmap memory allocation potentially allows any X.Org
user to execute arbitrary code with elevated privileges.
Comment 1 Thierry Carrez (RETIRED) gentoo-dev 2005-09-12 07:11:13 UTC
*** Bug 103737 has been marked as a duplicate of this bug. ***
Comment 2 Thierry Carrez (RETIRED) gentoo-dev 2005-09-12 07:11:57 UTC
Ebuild being committed right now.
Comment 3 Thierry Carrez (RETIRED) gentoo-dev 2005-09-12 08:28:50 UTC
Ebuild in, keyworded alright
Comment 4 Thierry Carrez (RETIRED) gentoo-dev 2005-09-12 08:51:40 UTC
GLSA 200509-07
Comment 5 Joshua Baergen (RETIRED) gentoo-dev 2005-09-12 16:49:03 UTC
For reference, this will be added to 6.8.99.15 and xorg-server (modular)
shortly.  Any other affected versions will be dropped.