Oval Definition:oval:com.redhat.rhsa:def:20080029
Revision Date:2008-03-20Version:639
Title:RHSA-2008:0029: XFree86 security update (Important)
Description:XFree86 is an implementation of the X Window System, which provides the core functionality for the Linux graphical desktop.

  • Two integer overflow flaws were found in the XFree86 server's EVI and MIT-SHM modules. A malicious authorized client could exploit these issues to cause a denial of service (crash), or potentially execute arbitrary code with root privileges on the XFree86 server. (CVE-2007-6429)

  • A heap based buffer overflow flaw was found in the way the XFree86 server handled malformed font files. A malicious local user could exploit this issue to potentially execute arbitrary code with the privileges of the XFree86 server. (CVE-2008-0006)

  • A memory corruption flaw was found in the XFree86 server's XInput extension. A malicious authorized client could exploit this issue to cause a denial of service (crash), or potentially execute arbitrary code with root privileges on the XFree86 server. (CVE-2007-6427)

  • An information disclosure flaw was found in the XFree86 server's TOG-CUP extension. A malicious authorized client could exploit this issue to cause a denial of service (crash), or potentially view arbitrary memory content within the XFree86 server's address space. (CVE-2007-6428)

  • An integer and heap overflow flaw were found in the X.org font server, xfs. A user with the ability to connect to the font server could have been able to cause a denial of service (crash), or potentially execute arbitrary code with the permissions of the font server. (CVE-2007-4568, CVE-2007-4990)

  • A flaw was found in the XFree86 server's XC-SECURITY extension, that could have allowed a local user to verify the existence of an arbitrary file, even in directories that are not normally accessible to that user. (CVE-2007-5958)

    Users of XFree86 are advised to upgrade to these updated packages, which contain backported patches to resolve these issues.
  • Family:unixClass:patch
    Status:Reference(s):CVE-2007-4568
    CVE-2007-4990
    CVE-2007-5958
    CVE-2007-6427
    CVE-2007-6428
    CVE-2007-6429
    CVE-2008-0006
    RHSA-2008:0029
    RHSA-2008:0029-02
    RHSA-2008:0029-02
    Platform(s):Red Hat Enterprise Linux 3
    Product(s):
    Definition Synopsis
  • Red Hat Enterprise Linux must be installed
  • OR Package Information
  • Red Hat Enterprise Linux 3 is installed
  • AND
  • XFree86-sdk is earlier than 0:4.3.0-126.EL
  • AND XFree86-sdk is signed with Red Hat master key
  • XFree86-xdm is earlier than 0:4.3.0-126.EL
  • AND XFree86-xdm is signed with Red Hat master key
  • XFree86-xfs is earlier than 0:4.3.0-126.EL
  • AND XFree86-xfs is signed with Red Hat master key
  • XFree86-100dpi-fonts is earlier than 0:4.3.0-126.EL
  • AND XFree86-100dpi-fonts is signed with Red Hat master key
  • XFree86-font-utils is earlier than 0:4.3.0-126.EL
  • AND XFree86-font-utils is signed with Red Hat master key
  • XFree86-tools is earlier than 0:4.3.0-126.EL
  • AND XFree86-tools is signed with Red Hat master key
  • XFree86-Xvfb is earlier than 0:4.3.0-126.EL
  • AND XFree86-Xvfb is signed with Red Hat master key
  • XFree86-truetype-fonts is earlier than 0:4.3.0-126.EL
  • AND XFree86-truetype-fonts is signed with Red Hat master key
  • XFree86-ISO8859-9-100dpi-fonts is earlier than 0:4.3.0-126.EL
  • AND XFree86-ISO8859-9-100dpi-fonts is signed with Red Hat master key
  • XFree86-xauth is earlier than 0:4.3.0-126.EL
  • AND XFree86-xauth is signed with Red Hat master key
  • XFree86-ISO8859-14-100dpi-fonts is earlier than 0:4.3.0-126.EL
  • AND XFree86-ISO8859-14-100dpi-fonts is signed with Red Hat master key
  • XFree86-syriac-fonts is earlier than 0:4.3.0-126.EL
  • AND XFree86-syriac-fonts is signed with Red Hat master key
  • XFree86-base-fonts is earlier than 0:4.3.0-126.EL
  • AND XFree86-base-fonts is signed with Red Hat master key
  • XFree86-libs-data is earlier than 0:4.3.0-126.EL
  • AND XFree86-libs-data is signed with Red Hat master key
  • XFree86-ISO8859-2-75dpi-fonts is earlier than 0:4.3.0-126.EL
  • AND XFree86-ISO8859-2-75dpi-fonts is signed with Red Hat master key
  • XFree86-ISO8859-9-75dpi-fonts is earlier than 0:4.3.0-126.EL
  • AND XFree86-ISO8859-9-75dpi-fonts is signed with Red Hat master key
  • XFree86 is earlier than 0:4.3.0-126.EL
  • AND XFree86 is signed with Red Hat master key
  • XFree86-twm is earlier than 0:4.3.0-126.EL
  • AND XFree86-twm is signed with Red Hat master key
  • XFree86-ISO8859-2-100dpi-fonts is earlier than 0:4.3.0-126.EL
  • AND XFree86-ISO8859-2-100dpi-fonts is signed with Red Hat master key
  • XFree86-cyrillic-fonts is earlier than 0:4.3.0-126.EL
  • AND XFree86-cyrillic-fonts is signed with Red Hat master key
  • XFree86-75dpi-fonts is earlier than 0:4.3.0-126.EL
  • AND XFree86-75dpi-fonts is signed with Red Hat master key
  • XFree86-Xnest is earlier than 0:4.3.0-126.EL
  • AND XFree86-Xnest is signed with Red Hat master key
  • XFree86-ISO8859-14-75dpi-fonts is earlier than 0:4.3.0-126.EL
  • AND XFree86-ISO8859-14-75dpi-fonts is signed with Red Hat master key
  • XFree86-doc is earlier than 0:4.3.0-126.EL
  • AND XFree86-doc is signed with Red Hat master key
  • XFree86-ISO8859-15-75dpi-fonts is earlier than 0:4.3.0-126.EL
  • AND XFree86-ISO8859-15-75dpi-fonts is signed with Red Hat master key
  • XFree86-devel is earlier than 0:4.3.0-126.EL
  • AND XFree86-devel is signed with Red Hat master key
  • XFree86-Mesa-libGL is earlier than 0:4.3.0-126.EL
  • AND XFree86-Mesa-libGL is signed with Red Hat master key
  • XFree86-ISO8859-15-100dpi-fonts is earlier than 0:4.3.0-126.EL
  • AND XFree86-ISO8859-15-100dpi-fonts is signed with Red Hat master key
  • XFree86-Mesa-libGLU is earlier than 0:4.3.0-126.EL
  • AND XFree86-Mesa-libGLU is signed with Red Hat master key
  • XFree86-libs is earlier than 0:4.3.0-126.EL
  • AND XFree86-libs is signed with Red Hat master key
  • BACK