- Issued:
- 2011-04-19
- Updated:
- 2011-04-19
RHBA-2011:0454 - Bug Fix Advisory
Synopsis
xorg-x11-server-utils bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated xorg-x11-server-utils package that fixes one bug is now available for
Red Hat Enterprise Linux 5.
Description
The xorg-x11-server-utils package contains a collection of utilities used to
modify and query the runtime configuration of the X.Org server. X.Org is an open
source implementation of the X Window System.
This update fixes the following bug:
- A previous advisory, the RHSA-2011:0433 xorg-x11-server-utils security update,
applied a backported patch to fix a flaw in the X server resource database
utility, xrdb. While this patch resolved the security issue, it also introduced
an error in the macro expansion mechanism. Consequent to this, an attempt to run
the xrdb utility could fail with the following messages written to standard
error:
sh: -c: line 0: unexpected EOF while looking for matching `"'
sh: -c: line 1: syntax error: unexpected end of file
With this update, the underlying source code has been adapted to correct the
macro expansion mechanism, and the xrdb utility now works as expected.
(BZ#696316)
All users of xorg-x11-server-utils are advised to upgrade to this updated
package, which fixes this bug. Note that all running instances of the X.Org
server must be restarted for this update to take effect.
Solution
Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 ia64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6 i386
- Red Hat Enterprise Linux Server - AUS 5.6 ia64
- Red Hat Enterprise Linux Server - AUS 5.6 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.6 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.6 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 x86_64
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6 i386
- Red Hat Enterprise Linux Server - AUS 5.6 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
Fixes
- BZ - 696316 - xorg-x11-server-utils: xrdb regression introduced by the CVE-2011-0465 fix [rhel-5]
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
xorg-x11-server-utils-7.1-5.el5_6.2.src.rpm | SHA-256: 540b0df84135a9f20908ff12c85930f772496e446eb62764271e2ec15658302f |
x86_64 | |
xorg-x11-server-utils-7.1-5.el5_6.2.x86_64.rpm | SHA-256: 1e37be170e16518a4846d587938d116fc06421dba137c15ae58c837d98b23b0d |
ia64 | |
xorg-x11-server-utils-7.1-5.el5_6.2.ia64.rpm | SHA-256: 0926e18b8ed391e91ce74e01ef17575dada2b97b187b12f865b0aa44aee8ba07 |
i386 | |
xorg-x11-server-utils-7.1-5.el5_6.2.i386.rpm | SHA-256: bd57c98739010b84df0851b0e31f9608f3ea8b749e6349afb58598d3e39663ca |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.6
SRPM | |
---|---|
xorg-x11-server-utils-7.1-5.el5_6.2.src.rpm | SHA-256: 540b0df84135a9f20908ff12c85930f772496e446eb62764271e2ec15658302f |
x86_64 | |
xorg-x11-server-utils-7.1-5.el5_6.2.x86_64.rpm | SHA-256: 1e37be170e16518a4846d587938d116fc06421dba137c15ae58c837d98b23b0d |
ia64 | |
xorg-x11-server-utils-7.1-5.el5_6.2.ia64.rpm | SHA-256: 0926e18b8ed391e91ce74e01ef17575dada2b97b187b12f865b0aa44aee8ba07 |
i386 | |
xorg-x11-server-utils-7.1-5.el5_6.2.i386.rpm | SHA-256: bd57c98739010b84df0851b0e31f9608f3ea8b749e6349afb58598d3e39663ca |
Red Hat Enterprise Linux Server - AUS 5.6
SRPM | |
---|---|
xorg-x11-server-utils-7.1-5.el5_6.2.src.rpm | SHA-256: 540b0df84135a9f20908ff12c85930f772496e446eb62764271e2ec15658302f |
ia64 | |
xorg-x11-server-utils-7.1-5.el5_6.2.ia64.rpm | SHA-256: 0926e18b8ed391e91ce74e01ef17575dada2b97b187b12f865b0aa44aee8ba07 |
x86_64 | |
xorg-x11-server-utils-7.1-5.el5_6.2.x86_64.rpm | SHA-256: 1e37be170e16518a4846d587938d116fc06421dba137c15ae58c837d98b23b0d |
i386 | |
xorg-x11-server-utils-7.1-5.el5_6.2.i386.rpm | SHA-256: bd57c98739010b84df0851b0e31f9608f3ea8b749e6349afb58598d3e39663ca |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
xorg-x11-server-utils-7.1-5.el5_6.2.src.rpm | SHA-256: 540b0df84135a9f20908ff12c85930f772496e446eb62764271e2ec15658302f |
x86_64 | |
xorg-x11-server-utils-7.1-5.el5_6.2.x86_64.rpm | SHA-256: 1e37be170e16518a4846d587938d116fc06421dba137c15ae58c837d98b23b0d |
i386 | |
xorg-x11-server-utils-7.1-5.el5_6.2.i386.rpm | SHA-256: bd57c98739010b84df0851b0e31f9608f3ea8b749e6349afb58598d3e39663ca |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
xorg-x11-server-utils-7.1-5.el5_6.2.src.rpm | SHA-256: 540b0df84135a9f20908ff12c85930f772496e446eb62764271e2ec15658302f |
x86_64 | |
xorg-x11-server-utils-7.1-5.el5_6.2.x86_64.rpm | SHA-256: 1e37be170e16518a4846d587938d116fc06421dba137c15ae58c837d98b23b0d |
i386 | |
xorg-x11-server-utils-7.1-5.el5_6.2.i386.rpm | SHA-256: bd57c98739010b84df0851b0e31f9608f3ea8b749e6349afb58598d3e39663ca |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.6
SRPM | |
---|---|
xorg-x11-server-utils-7.1-5.el5_6.2.src.rpm | SHA-256: 540b0df84135a9f20908ff12c85930f772496e446eb62764271e2ec15658302f |
s390x | |
xorg-x11-server-utils-7.1-5.el5_6.2.s390x.rpm | SHA-256: da688f286cda90fc822f87be28c0a70d04e618242ceb7719726420ddf1f5ee0a |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
xorg-x11-server-utils-7.1-5.el5_6.2.src.rpm | SHA-256: 540b0df84135a9f20908ff12c85930f772496e446eb62764271e2ec15658302f |
ppc | |
xorg-x11-server-utils-7.1-5.el5_6.2.ppc.rpm | SHA-256: d7a751832efd553717d964b1a6da13bd1fef5965286a7ec9fb60f5e6e5940709 |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.6
SRPM | |
---|---|
xorg-x11-server-utils-7.1-5.el5_6.2.src.rpm | SHA-256: 540b0df84135a9f20908ff12c85930f772496e446eb62764271e2ec15658302f |
ppc | |
xorg-x11-server-utils-7.1-5.el5_6.2.ppc.rpm | SHA-256: d7a751832efd553717d964b1a6da13bd1fef5965286a7ec9fb60f5e6e5940709 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
xorg-x11-server-utils-7.1-5.el5_6.2.src.rpm | SHA-256: 540b0df84135a9f20908ff12c85930f772496e446eb62764271e2ec15658302f |
x86_64 | |
xorg-x11-server-utils-7.1-5.el5_6.2.x86_64.rpm | SHA-256: 1e37be170e16518a4846d587938d116fc06421dba137c15ae58c837d98b23b0d |
i386 | |
xorg-x11-server-utils-7.1-5.el5_6.2.i386.rpm | SHA-256: bd57c98739010b84df0851b0e31f9608f3ea8b749e6349afb58598d3e39663ca |
Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.6
SRPM | |
---|---|
xorg-x11-server-utils-7.1-5.el5_6.2.src.rpm | SHA-256: 540b0df84135a9f20908ff12c85930f772496e446eb62764271e2ec15658302f |
x86_64 | |
xorg-x11-server-utils-7.1-5.el5_6.2.x86_64.rpm | SHA-256: 1e37be170e16518a4846d587938d116fc06421dba137c15ae58c837d98b23b0d |
i386 | |
xorg-x11-server-utils-7.1-5.el5_6.2.i386.rpm | SHA-256: bd57c98739010b84df0851b0e31f9608f3ea8b749e6349afb58598d3e39663ca |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
xorg-x11-server-utils-7.1-5.el5_6.2.src.rpm | SHA-256: 540b0df84135a9f20908ff12c85930f772496e446eb62764271e2ec15658302f |
s390x | |
xorg-x11-server-utils-7.1-5.el5_6.2.s390x.rpm | SHA-256: da688f286cda90fc822f87be28c0a70d04e618242ceb7719726420ddf1f5ee0a |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.