GLSA: xfree

From: Daniel Ahlberg (alizat_private)
Date: Thu Oct 24 2002 - 02:58:13 PDT

  • Next message: D4rkGr3y: "TFTP Server DoS"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - - --------------------------------------------------------------------
    GENTOO LINUX SECURITY ANNOUNCEMENT 200210-006
    - - --------------------------------------------------------------------
    
    PACKAGE : xfree
    SUMMARY : Shared memory may be compromised by local XFree86 users
    DATE    : 2002-10-24 10:00 UTC
    EXPLOIT : local
    
    - - --------------------------------------------------------------------
    
    Roberto Zunino discovered a vulnerability in the MIT-SHM extension of
    XFree86 prior to versions 4.2.1. The vulnerability allows a local
    user who can run XFree86 to gain read/write access to any shared
    memory segment in the system. Although the use of shared memory
    segments to store trusted data is not a common practice, by
    exploiting this vulnerability the attacker potentially can get and/or
    change sensitive information.
    
    SOLUTION
    
    It is recommended that all Gentoo Linux users who are running
    x11-base/xfree-4.2.0-r12 and earlier update their systems
    as follows:
    
    emerge rsync
    emerge xfree
    emerge clean
    
    - - --------------------------------------------------------------------
    alizat_private - GnuPG key is available at www.gentoo.org/~aliz
    - - --------------------------------------------------------------------
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.2.0 (GNU/Linux)
    
    iD8DBQE9t8Q0fT7nyhUpoZMRAhNtAJ9LVe8VAj8cSWvNfreoZcBgdMewvACgwy64
    cSJNZmLWeKfcol6ah9xIYQ8=
    =fEUk
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Thu Oct 24 2002 - 11:32:19 PDT