blob: 9e8c17cfec6c935a47f14ff7e1579c6d68038afd [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200705-06">
<title>X.Org X11 library: Multiple integer overflows</title>
The X.Org X11 library contains multiple integer overflows, which could lead
to the execution of arbitrary code.
<product type="ebuild">libx11</product>
<announced>May 05, 2007</announced>
<revised>May 05, 2007: 01</revised>
<package name="x11-libs/libX11" auto="yes" arch="*">
<unaffected range="ge">1.0.3-r2</unaffected>
<vulnerable range="lt">1.0.3-r2</vulnerable>
X.Org is an implementation of the X Window System. The X.Org X11
library provides the X11 protocol library files.
Multiple integer overflows have been reported in the XGetPixel()
function of the X.Org X11 library.
<impact type="high">
By enticing a user to open a specially crafted image, an attacker could
cause a Denial of Service or an integer overflow, potentially resulting
in the execution of arbitrary code with root privileges.
There is no known workaround at this time.
All X.Org X11 library users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=x11-libs/libX11-1.0.3-r2&quot;</code>
<uri link="">CVE-2007-1667</uri>
<metadata tag="requester" timestamp="Wed, 18 Apr 2007 14:52:56 +0000">
<metadata tag="submitter" timestamp="Fri, 20 Apr 2007 16:53:31 +0000">
<metadata tag="bugReady" timestamp="Mon, 23 Apr 2007 12:10:37 +0000">