Skip to navigation

Security Advisory XFree86 security update

Advisory: RHSA-2005:044-15
Type: Security Advisory
Severity: Moderate
Issued on: 2005-04-06
Last updated on: 2005-04-06
Affected Products: Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux WS (v. 2.1)
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor
CVEs (cve.mitre.org): CVE-2005-0605

Details

Updated XFree86 packages that fix a libXpm integer overflow flaw and a
number of bugs are now available.

This update has been rated as having moderate security impact by the Red Hat
Security Response Team.

XFree86 is an open source implementation of the X Window System. It
provides the basic low level functionality which full-fledged graphical
user interfaces (GUIs) such as GNOME and KDE are designed upon.

An integer overflow flaw was found in libXpm, which is used by some
applications for loading of XPM images. An attacker could create a
malicious XPM file that would execute arbitrary code if opened by a victim
using an application linked to the vulnerable library. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2005-0605 to this issue.

XFree86 4.1.0 was not functional on systems that did not have a legacy
keyboard controller (8042). During startup, the X server would attempt to
update registers on the 8042 controller, but if that chip was not present,
the X server would hang during startup. This new release has a workaround
so that the access to those registers time out if they are not present.

A bug in libXaw could cause applications to segfault on 64-bit systems
under certain circumstances. This has been fixed with a patch backported
from XFree86 4.3.0.

Xlib contained a memory leak caused by double allocation, which has been
fixed in XFree86 4.3.0 using backported patch.

All users of XFree86 should upgrade to these updated packages, which
resolve these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

Updated packages

Red Hat Enterprise Linux AS (v. 2.1)

IA-32:
XFree86-100dpi-fonts-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: e07be739078da8cd42d598a06b006f1e
XFree86-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: bcebe61e2d614a1286b52775736e52c9
XFree86-75dpi-fonts-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: cdddd54938649761e21827745c1366e2
XFree86-ISO8859-15-100dpi-fonts-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: 182573d60222c73168fbfe66b16bb29b
XFree86-ISO8859-15-75dpi-fonts-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: 2ae9bce6c130784e41d2b133a35e5774
XFree86-ISO8859-2-100dpi-fonts-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: 9f3cf4be959caffa4c3bffbf76a09176
XFree86-ISO8859-2-75dpi-fonts-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: 8c6f826f094aaa5135391f6ec27b0455
XFree86-ISO8859-9-100dpi-fonts-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: 6b8f23211c43fc99dc05d75f9d0e4f86
XFree86-ISO8859-9-75dpi-fonts-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: bbda1f088f4cfc778a66cd4520df1b7e
XFree86-Xnest-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: 439c6b7b18a9321a7a1a8476ec5c96b8
XFree86-Xvfb-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: a47a287faa17c415776f1f8a31b0882a
XFree86-cyrillic-fonts-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: c17eeb2f724dfcfa1983bd3b8d3f89b9
XFree86-devel-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: 26b1c9ede0bd137fe1504208d2e69489
XFree86-doc-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: cc3412a58aed56a2b5ae7818168531f4
XFree86-libs-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: e49c0750c474dfeede93ebc600bbe4f3
XFree86-tools-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: f6f827427339cf3e48d270391df35221
XFree86-twm-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: a8d8c8692e3ec74a267de41a7a047e9f
XFree86-xdm-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: 9a583b83825b2713edcc68d833ec2fc1
XFree86-xf86cfg-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: ae1bb514c1c8e4671b441404e88b200e
XFree86-xfs-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: 27935274796d0c0ee7825ae75d3ca1c7
 
IA-64:
XFree86-100dpi-fonts-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: ace0691b089cc424945b118071a7a8c9
XFree86-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: 33a876d683ad988e13007f7bb2908193
XFree86-75dpi-fonts-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: 755157ba244a462e4fd3e07b6a2db275
XFree86-ISO8859-15-100dpi-fonts-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: 9d10412d6bda791a11554c660319f010
XFree86-ISO8859-15-75dpi-fonts-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: 977a033b155e1386d32ee4ede524ac0f
XFree86-ISO8859-2-100dpi-fonts-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: af4621efc40f5cea331727729755af69
XFree86-ISO8859-2-75dpi-fonts-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: 81495baca5ebe29af2eb37a9bb0d96e0
XFree86-ISO8859-9-100dpi-fonts-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: 170e310833a6f8f9e9bbd75e2838ef8b
XFree86-ISO8859-9-75dpi-fonts-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: ecfc7e5337276ac690f75eb802e57e06
XFree86-Xnest-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: 2f4a2252320e36593a078e22fec9d2b1
XFree86-Xvfb-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: 462a5ebdbdbc90669d575e12dea1fe14
XFree86-cyrillic-fonts-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: 0a3f4d30395f408f0b5008e6864aa567
XFree86-devel-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: a6678a2489fb1f6d4098ce523366a69b
XFree86-doc-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: 71de4899c3aa12a29baeba308b00d073
XFree86-libs-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: ab87a37e06ade10ba4287d8f857032ed
XFree86-tools-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: 5832143085762fc53e894b4804b72af8
XFree86-twm-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: daed2b361a134a05c65d51539fe7549a
XFree86-xdm-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: fb046d7f1ca1d951a9c3ed44c8407b4b
XFree86-xfs-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: 02a7215f3a1ef684fc45f2544f3aa652
 
Red Hat Enterprise Linux ES (v. 2.1)

IA-32:
XFree86-100dpi-fonts-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: e07be739078da8cd42d598a06b006f1e
XFree86-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: bcebe61e2d614a1286b52775736e52c9
XFree86-75dpi-fonts-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: cdddd54938649761e21827745c1366e2
XFree86-ISO8859-15-100dpi-fonts-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: 182573d60222c73168fbfe66b16bb29b
XFree86-ISO8859-15-75dpi-fonts-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: 2ae9bce6c130784e41d2b133a35e5774
XFree86-ISO8859-2-100dpi-fonts-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: 9f3cf4be959caffa4c3bffbf76a09176
XFree86-ISO8859-2-75dpi-fonts-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: 8c6f826f094aaa5135391f6ec27b0455
XFree86-ISO8859-9-100dpi-fonts-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: 6b8f23211c43fc99dc05d75f9d0e4f86
XFree86-ISO8859-9-75dpi-fonts-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: bbda1f088f4cfc778a66cd4520df1b7e
XFree86-Xnest-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: 439c6b7b18a9321a7a1a8476ec5c96b8
XFree86-Xvfb-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: a47a287faa17c415776f1f8a31b0882a
XFree86-cyrillic-fonts-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: c17eeb2f724dfcfa1983bd3b8d3f89b9
XFree86-devel-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: 26b1c9ede0bd137fe1504208d2e69489
XFree86-doc-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: cc3412a58aed56a2b5ae7818168531f4
XFree86-libs-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: e49c0750c474dfeede93ebc600bbe4f3
XFree86-tools-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: f6f827427339cf3e48d270391df35221
XFree86-twm-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: a8d8c8692e3ec74a267de41a7a047e9f
XFree86-xdm-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: 9a583b83825b2713edcc68d833ec2fc1
XFree86-xf86cfg-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: ae1bb514c1c8e4671b441404e88b200e
XFree86-xfs-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: 27935274796d0c0ee7825ae75d3ca1c7
 
Red Hat Enterprise Linux WS (v. 2.1)

IA-32:
XFree86-100dpi-fonts-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: e07be739078da8cd42d598a06b006f1e
XFree86-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: bcebe61e2d614a1286b52775736e52c9
XFree86-75dpi-fonts-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: cdddd54938649761e21827745c1366e2
XFree86-ISO8859-15-100dpi-fonts-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: 182573d60222c73168fbfe66b16bb29b
XFree86-ISO8859-15-75dpi-fonts-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: 2ae9bce6c130784e41d2b133a35e5774
XFree86-ISO8859-2-100dpi-fonts-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: 9f3cf4be959caffa4c3bffbf76a09176
XFree86-ISO8859-2-75dpi-fonts-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: 8c6f826f094aaa5135391f6ec27b0455
XFree86-ISO8859-9-100dpi-fonts-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: 6b8f23211c43fc99dc05d75f9d0e4f86
XFree86-ISO8859-9-75dpi-fonts-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: bbda1f088f4cfc778a66cd4520df1b7e
XFree86-Xnest-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: 439c6b7b18a9321a7a1a8476ec5c96b8
XFree86-Xvfb-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: a47a287faa17c415776f1f8a31b0882a
XFree86-cyrillic-fonts-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: c17eeb2f724dfcfa1983bd3b8d3f89b9
XFree86-devel-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: 26b1c9ede0bd137fe1504208d2e69489
XFree86-doc-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: cc3412a58aed56a2b5ae7818168531f4
XFree86-libs-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: e49c0750c474dfeede93ebc600bbe4f3
XFree86-tools-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: f6f827427339cf3e48d270391df35221
XFree86-twm-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: a8d8c8692e3ec74a267de41a7a047e9f
XFree86-xdm-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: 9a583b83825b2713edcc68d833ec2fc1
XFree86-xf86cfg-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: ae1bb514c1c8e4671b441404e88b200e
XFree86-xfs-4.1.0-71.EL.i386.rpm
File outdated by:  RHSA-2008:0512
    MD5: 27935274796d0c0ee7825ae75d3ca1c7
 
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor

IA-64:
XFree86-100dpi-fonts-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: ace0691b089cc424945b118071a7a8c9
XFree86-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: 33a876d683ad988e13007f7bb2908193
XFree86-75dpi-fonts-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: 755157ba244a462e4fd3e07b6a2db275
XFree86-ISO8859-15-100dpi-fonts-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: 9d10412d6bda791a11554c660319f010
XFree86-ISO8859-15-75dpi-fonts-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: 977a033b155e1386d32ee4ede524ac0f
XFree86-ISO8859-2-100dpi-fonts-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: af4621efc40f5cea331727729755af69
XFree86-ISO8859-2-75dpi-fonts-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: 81495baca5ebe29af2eb37a9bb0d96e0
XFree86-ISO8859-9-100dpi-fonts-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: 170e310833a6f8f9e9bbd75e2838ef8b
XFree86-ISO8859-9-75dpi-fonts-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: ecfc7e5337276ac690f75eb802e57e06
XFree86-Xnest-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: 2f4a2252320e36593a078e22fec9d2b1
XFree86-Xvfb-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: 462a5ebdbdbc90669d575e12dea1fe14
XFree86-cyrillic-fonts-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: 0a3f4d30395f408f0b5008e6864aa567
XFree86-devel-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: a6678a2489fb1f6d4098ce523366a69b
XFree86-doc-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: 71de4899c3aa12a29baeba308b00d073
XFree86-libs-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: ab87a37e06ade10ba4287d8f857032ed
XFree86-tools-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: 5832143085762fc53e894b4804b72af8
XFree86-twm-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: daed2b361a134a05c65d51539fe7549a
XFree86-xdm-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: fb046d7f1ca1d951a9c3ed44c8407b4b
XFree86-xfs-4.1.0-71.EL.ia64.rpm
File outdated by:  RHSA-2008:0512
    MD5: 02a7215f3a1ef684fc45f2544f3aa652
 

Bugs fixed (see bugzilla for more information)

150038 - CAN-2005-0605 XPM buffer overflow


References


Keywords

controller, crash, keyboard, leak, legacy, memory, segfault, SEGV, Xpm


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/