Skip to navigation

Security Advisory Important: xorg-x11-server security update

Advisory: RHSA-2007:0127-2
Type: Security Advisory
Severity: Important
Issued on: 2007-04-03
Last updated on: 2007-04-03
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
CVEs (cve.mitre.org): CVE-2007-1003

Details

Updated X.org X11 server packages that fix a security issue are now
available for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

X.org is an open source implementation of the X Window System. It provides
the basic low-level functionality that full-fledged graphical user
interfaces are designed upon.

iDefense reported an integer overflow flaw in the X.org X11 server XC-MISC
extension. A malicious authorized client could exploit this issue to cause
a denial of service (crash) or potentially execute arbitrary code with root
privileges on the X.org server. (CVE-2007-1003)

Users of the X.org X11 server should upgrade to these updated packages,
which contain a backported patch and is not vulnerable to this issue.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
xorg-x11-server-1.1.1-48.13.0.1.el5.src.rpm
File outdated by:  RHBA-2014:0361
    MD5: f165c646ef24bdf7aea35dcd02f3994e
 
IA-32:
xorg-x11-server-sdk-1.1.1-48.13.0.1.el5.i386.rpm
File outdated by:  RHBA-2014:0361
    MD5: 4b0fcea97774ed878cf8ec3d8229918e
 
x86_64:
xorg-x11-server-sdk-1.1.1-48.13.0.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0361
    MD5: 45552f0cfc32826ec7f15ef2fe85ebce
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
xorg-x11-server-1.1.1-48.13.0.1.el5.src.rpm
File outdated by:  RHBA-2014:0361
    MD5: f165c646ef24bdf7aea35dcd02f3994e
 
IA-32:
xorg-x11-server-Xdmx-1.1.1-48.13.0.1.el5.i386.rpm
File outdated by:  RHBA-2014:0361
    MD5: 4ac82a4321e40c6e2315d91f273f03f6
xorg-x11-server-Xephyr-1.1.1-48.13.0.1.el5.i386.rpm
File outdated by:  RHBA-2014:0361
    MD5: 15552fa4e7a6a1a1de0fc3f0e292ff9d
xorg-x11-server-Xnest-1.1.1-48.13.0.1.el5.i386.rpm
File outdated by:  RHBA-2014:0361
    MD5: 6904668064a54569c0069ef84525244c
xorg-x11-server-Xorg-1.1.1-48.13.0.1.el5.i386.rpm
File outdated by:  RHBA-2014:0361
    MD5: 35be18e2b2e480afcc7ef6ed783ccc51
xorg-x11-server-Xvfb-1.1.1-48.13.0.1.el5.i386.rpm
File outdated by:  RHBA-2014:0361
    MD5: a03d6baf97916deb19a038f44bbdc617
xorg-x11-server-sdk-1.1.1-48.13.0.1.el5.i386.rpm
File outdated by:  RHBA-2014:0361
    MD5: 4b0fcea97774ed878cf8ec3d8229918e
 
IA-64:
xorg-x11-server-Xdmx-1.1.1-48.13.0.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0361
    MD5: 1382c0813050cf03d7e08823c152d09b
xorg-x11-server-Xephyr-1.1.1-48.13.0.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0361
    MD5: a4ced5410990effdde9931dda62693ad
xorg-x11-server-Xnest-1.1.1-48.13.0.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0361
    MD5: 1cb88ddefe5120343b601637159a582f
xorg-x11-server-Xorg-1.1.1-48.13.0.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0361
    MD5: f3b6ab243b698987ae3f52c3df9694e0
xorg-x11-server-Xvfb-1.1.1-48.13.0.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0361
    MD5: 693e49f05f08f625414fbb4f0e2a43ef
xorg-x11-server-sdk-1.1.1-48.13.0.1.el5.ia64.rpm
File outdated by:  RHBA-2014:0361
    MD5: de9422348f37dddbed72d0ba099784f9
 
PPC:
xorg-x11-server-Xdmx-1.1.1-48.13.0.1.el5.ppc.rpm
File outdated by:  RHBA-2014:0361
    MD5: e9a5bd06364e558805adef522547da38
xorg-x11-server-Xephyr-1.1.1-48.13.0.1.el5.ppc.rpm
File outdated by:  RHBA-2014:0361
    MD5: c9c28a3edbdb88e17e9f315c5ebe6a0b
xorg-x11-server-Xnest-1.1.1-48.13.0.1.el5.ppc.rpm
File outdated by:  RHBA-2014:0361
    MD5: 8ba30d162413630541a3e86f2e955acc
xorg-x11-server-Xorg-1.1.1-48.13.0.1.el5.ppc.rpm
File outdated by:  RHBA-2014:0361
    MD5: 12407cf8ef84e30858e881d4ee956493
xorg-x11-server-Xvfb-1.1.1-48.13.0.1.el5.ppc.rpm
File outdated by:  RHBA-2014:0361
    MD5: 0ab6c48bb411139f4941b9976e5928c3
xorg-x11-server-sdk-1.1.1-48.13.0.1.el5.ppc.rpm
File outdated by:  RHBA-2014:0361
    MD5: f24e4514ce2d6837954b99f6f5ce78a9
 
s390x:
xorg-x11-server-Xephyr-1.1.1-48.13.0.1.el5.s390x.rpm
File outdated by:  RHBA-2014:0361
    MD5: 2d0ebaf16c3d4e111c24bdcefd3dd775
xorg-x11-server-Xnest-1.1.1-48.13.0.1.el5.s390x.rpm
File outdated by:  RHBA-2014:0361
    MD5: 3aa5a53b66c679b6e65962cef215d479
xorg-x11-server-Xvfb-1.1.1-48.13.0.1.el5.s390x.rpm
File outdated by:  RHBA-2014:0361
    MD5: 49b504e4c01dad2303babbe272dc99b7
 
x86_64:
xorg-x11-server-Xdmx-1.1.1-48.13.0.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0361
    MD5: 3c3cabed8f92625968704ff192793fc4
xorg-x11-server-Xephyr-1.1.1-48.13.0.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0361
    MD5: 3d515fe01f61e31b6cd86bc20d4f1c05
xorg-x11-server-Xnest-1.1.1-48.13.0.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0361
    MD5: 7160f1f23ea3690f716e29e0e8c61e6e
xorg-x11-server-Xorg-1.1.1-48.13.0.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0361
    MD5: 278835bdc3120b247360205c30a1d6b5
xorg-x11-server-Xvfb-1.1.1-48.13.0.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0361
    MD5: cab10df3473d826cd1aa6ad4af7dcdc1
xorg-x11-server-sdk-1.1.1-48.13.0.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0361
    MD5: 45552f0cfc32826ec7f15ef2fe85ebce
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
xorg-x11-server-1.1.1-48.13.0.1.el5.src.rpm
File outdated by:  RHBA-2014:0361
    MD5: f165c646ef24bdf7aea35dcd02f3994e
 
IA-32:
xorg-x11-server-Xdmx-1.1.1-48.13.0.1.el5.i386.rpm
File outdated by:  RHBA-2014:0361
    MD5: 4ac82a4321e40c6e2315d91f273f03f6
xorg-x11-server-Xephyr-1.1.1-48.13.0.1.el5.i386.rpm
File outdated by:  RHBA-2014:0361
    MD5: 15552fa4e7a6a1a1de0fc3f0e292ff9d
xorg-x11-server-Xnest-1.1.1-48.13.0.1.el5.i386.rpm
File outdated by:  RHBA-2014:0361
    MD5: 6904668064a54569c0069ef84525244c
xorg-x11-server-Xorg-1.1.1-48.13.0.1.el5.i386.rpm
File outdated by:  RHBA-2014:0361
    MD5: 35be18e2b2e480afcc7ef6ed783ccc51
xorg-x11-server-Xvfb-1.1.1-48.13.0.1.el5.i386.rpm
File outdated by:  RHBA-2014:0361
    MD5: a03d6baf97916deb19a038f44bbdc617
 
x86_64:
xorg-x11-server-Xdmx-1.1.1-48.13.0.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0361
    MD5: 3c3cabed8f92625968704ff192793fc4
xorg-x11-server-Xephyr-1.1.1-48.13.0.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0361
    MD5: 3d515fe01f61e31b6cd86bc20d4f1c05
xorg-x11-server-Xnest-1.1.1-48.13.0.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0361
    MD5: 7160f1f23ea3690f716e29e0e8c61e6e
xorg-x11-server-Xorg-1.1.1-48.13.0.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0361
    MD5: 278835bdc3120b247360205c30a1d6b5
xorg-x11-server-Xvfb-1.1.1-48.13.0.1.el5.x86_64.rpm
File outdated by:  RHBA-2014:0361
    MD5: cab10df3473d826cd1aa6ad4af7dcdc1
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

233001 - CVE-2007-1003 xserver XC-MISC integer overflow


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/