Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 105688

Summary: x11-base/xorg-x11 buffer overflow (CAN-2005-2495)
Product: Gentoo Security Reporter: Thierry Carrez (RETIRED) <koon>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: blocker CC: jaervosz, x11
Priority: High    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://bugs.freedesktop.org/show_bug.cgi?id=594
Whiteboard: B0? [glsa]
Package list:
Runtime testing required: ---

Description Thierry Carrez (RETIRED) gentoo-dev 2005-09-12 07:10:00 UTC
An integer overflow in pixmap memory allocation potentially allows any X.Org
user to execute arbitrary code with elevated privileges.
Comment 1 Thierry Carrez (RETIRED) gentoo-dev 2005-09-12 07:11:13 UTC
*** Bug 103737 has been marked as a duplicate of this bug. ***
Comment 2 Thierry Carrez (RETIRED) gentoo-dev 2005-09-12 07:11:57 UTC
Ebuild being committed right now.
Comment 3 Thierry Carrez (RETIRED) gentoo-dev 2005-09-12 08:28:50 UTC
Ebuild in, keyworded alright
Comment 4 Thierry Carrez (RETIRED) gentoo-dev 2005-09-12 08:51:40 UTC
GLSA 200509-07
Comment 5 Joshua Baergen (RETIRED) gentoo-dev 2005-09-12 16:49:03 UTC
For reference, this will be added to 6.8.99.15 and xorg-server (modular)
shortly.  Any other affected versions will be dropped.