lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200311181957.hAIJvPO04981@lacrosse.corp.redhat.com>
From: bugzilla at redhat.com (bugzilla@...hat.com)
Subject: [RHSA-2003:288-01] Updated XFree86 packages provide security and bug fixes

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Updated XFree86 packages provide security and bug fixes
Advisory ID:       RHSA-2003:288-01
Issue date:        2003-11-17
Updated on:        2003-11-17
Product:           Red Hat Linux
Keywords:          
Cross references:  
Obsoletes:         
CVE Names:         CAN-2003-0690 CAN-2003-0692 CAN-2003-0730
- ---------------------------------------------------------------------

1. Topic:

Updated XFree86 packages for Red Hat Linux 9 provide security
fixes to font libraries and XDM.

2. Relevant releases/architectures:

Red Hat Linux 9 - i386

3. Problem description:

XFree86 is an implementation of the X Window System providing the core
graphical user interface and video drivers in Red Hat Linux. XDM is the X
display manager.

Multiple integer overflows in the transfer and enumeration of font
libraries in XFree86 allow local or remote attackers to cause a denial of
service or execute arbitrary code via heap-based and stack-based buffer
overflow attacks.  The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2003-0730 to this issue.  

The risk to users from this vulnerability is  limited because only clients
can be affected by these bugs, however in some (non-default)
configurations, both xfs and the X Server can act as clients
to remote font servers.

XDM does not verify whether the pam_setcred function call succeeds, which
may allow attackers to gain root privileges by triggering error conditions
within PAM modules, as demonstrated in certain configurations of the
pam_krb5 module.  The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2003-0690 to this issue.  

XDM uses a weak session cookie generation algorithm that does not provide
128 bits of entropy, which allows attackers to guess session cookies via
brute force methods and gain access to the user session.  The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2003-0692 to this issue.  

Users are advised to upgrade to these updated XFree86 4.3.0 packages, which
contain backported security patches and are not vulnerable to these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which are
not installed but included in the list will not be updated.  Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network.  Many
people find this an easier way to apply updates.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

If up2date fails to connect to Red Hat Network due to SSL Certificate 
Errors, you need to install a version of the up2date client with an updated 
certificate.  The latest version of up2date is available from the Red Hat 
FTP site and may also be downloaded directly from the RHN website:

https://rhn.redhat.com/help/latest-up2date.pxt

5. RPMs required:

Red Hat Linux 9:

SRPMS:
ftp://updates.redhat.com/9/en/os/SRPMS/XFree86-4.3.0-2.90.43.src.rpm

i386:
ftp://updates.redhat.com/9/en/os/i386/XFree86-100dpi-fonts-4.3.0-2.90.43.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/XFree86-4.3.0-2.90.43.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/XFree86-75dpi-fonts-4.3.0-2.90.43.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/XFree86-ISO8859-14-100dpi-fonts-4.3.0-2.90.43.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/XFree86-ISO8859-14-75dpi-fonts-4.3.0-2.90.43.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/XFree86-ISO8859-15-100dpi-fonts-4.3.0-2.90.43.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/XFree86-ISO8859-15-75dpi-fonts-4.3.0-2.90.43.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/XFree86-ISO8859-2-100dpi-fonts-4.3.0-2.90.43.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/XFree86-ISO8859-2-75dpi-fonts-4.3.0-2.90.43.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/XFree86-ISO8859-9-100dpi-fonts-4.3.0-2.90.43.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/XFree86-ISO8859-9-75dpi-fonts-4.3.0-2.90.43.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/XFree86-Mesa-libGL-4.3.0-2.90.43.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/XFree86-Mesa-libGLU-4.3.0-2.90.43.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/XFree86-Xnest-4.3.0-2.90.43.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/XFree86-Xvfb-4.3.0-2.90.43.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/XFree86-base-fonts-4.3.0-2.90.43.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/XFree86-cyrillic-fonts-4.3.0-2.90.43.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/XFree86-devel-4.3.0-2.90.43.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/XFree86-doc-4.3.0-2.90.43.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/XFree86-font-utils-4.3.0-2.90.43.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/XFree86-libs-4.3.0-2.90.43.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/XFree86-libs-data-4.3.0-2.90.43.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/XFree86-sdk-4.3.0-2.90.43.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/XFree86-syriac-fonts-4.3.0-2.90.43.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/XFree86-tools-4.3.0-2.90.43.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/XFree86-truetype-fonts-4.3.0-2.90.43.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/XFree86-twm-4.3.0-2.90.43.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/XFree86-xauth-4.3.0-2.90.43.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/XFree86-xdm-4.3.0-2.90.43.i386.rpm
ftp://updates.redhat.com/9/en/os/i386/XFree86-xfs-4.3.0-2.90.43.i386.rpm



6. Verification:

MD5 sum                          Package Name
- --------------------------------------------------------------------------
197d83599eabea9ab424a9390fe7d753 9/en/os/SRPMS/XFree86-4.3.0-2.90.43.src.rpm
89864dfb981aaa052499e338cb85acd9 9/en/os/i386/XFree86-100dpi-fonts-4.3.0-2.90.43.i386.rpm
31bbf1f22ba1fa6dea820b88e9a2059e 9/en/os/i386/XFree86-4.3.0-2.90.43.i386.rpm
edd5121ecf72d39fd7581145c8b7fcbc 9/en/os/i386/XFree86-75dpi-fonts-4.3.0-2.90.43.i386.rpm
826d4f7c2914b732ca43485266b3daad 9/en/os/i386/XFree86-ISO8859-14-100dpi-fonts-4.3.0-2.90.43.i386.rpm
89088cdc60bb8569da301d50e05d8f63 9/en/os/i386/XFree86-ISO8859-14-75dpi-fonts-4.3.0-2.90.43.i386.rpm
91b062cc8015a5898894bfdf90d6ff99 9/en/os/i386/XFree86-ISO8859-15-100dpi-fonts-4.3.0-2.90.43.i386.rpm
9f59c6547411fd257c45a953ab6e5921 9/en/os/i386/XFree86-ISO8859-15-75dpi-fonts-4.3.0-2.90.43.i386.rpm
4e1c0ac39a47f968a2e7299be1efaf48 9/en/os/i386/XFree86-ISO8859-2-100dpi-fonts-4.3.0-2.90.43.i386.rpm
bf9432be1a3ce7d4b24901420f07fb5d 9/en/os/i386/XFree86-ISO8859-2-75dpi-fonts-4.3.0-2.90.43.i386.rpm
96aa54b74718fdbdd72e8ccec8415b3f 9/en/os/i386/XFree86-ISO8859-9-100dpi-fonts-4.3.0-2.90.43.i386.rpm
bc79f57efa4e1a845382827d9021fd1e 9/en/os/i386/XFree86-ISO8859-9-75dpi-fonts-4.3.0-2.90.43.i386.rpm
5f72d9cb4aac84f6dfd2fc0439037272 9/en/os/i386/XFree86-Mesa-libGL-4.3.0-2.90.43.i386.rpm
50b9edb13b54d3769602da54bb3183af 9/en/os/i386/XFree86-Mesa-libGLU-4.3.0-2.90.43.i386.rpm
b37d0aefee6a1b379be3ab30cd1923df 9/en/os/i386/XFree86-Xnest-4.3.0-2.90.43.i386.rpm
dd3a8c3271854b8e26dad948998e8952 9/en/os/i386/XFree86-Xvfb-4.3.0-2.90.43.i386.rpm
6f2aca8b9f3137b5da779c56eb73ec14 9/en/os/i386/XFree86-base-fonts-4.3.0-2.90.43.i386.rpm
5aa4659e2ec992b1b087e8d6c7190ff6 9/en/os/i386/XFree86-cyrillic-fonts-4.3.0-2.90.43.i386.rpm
c6f870637e148f1da88e93181191f8da 9/en/os/i386/XFree86-devel-4.3.0-2.90.43.i386.rpm
0a427f41d4558bdd0b5cbcc857b9f766 9/en/os/i386/XFree86-doc-4.3.0-2.90.43.i386.rpm
b3d53e1f9112010e9d3d2a866cfe4157 9/en/os/i386/XFree86-font-utils-4.3.0-2.90.43.i386.rpm
d3b427915a56fcf2a4de2a26266f7903 9/en/os/i386/XFree86-libs-4.3.0-2.90.43.i386.rpm
83dd0d4ecae97e40f0bd47ed07309b93 9/en/os/i386/XFree86-libs-data-4.3.0-2.90.43.i386.rpm
7b970292113693ae24285baca7effcd5 9/en/os/i386/XFree86-sdk-4.3.0-2.90.43.i386.rpm
aef8d7a6c6639c8ae9b5c8d554e458d2 9/en/os/i386/XFree86-syriac-fonts-4.3.0-2.90.43.i386.rpm
99a9274e87f44f1186fb53acf0e47553 9/en/os/i386/XFree86-tools-4.3.0-2.90.43.i386.rpm
371796a37e8f6f15d07cbbb4a2d35539 9/en/os/i386/XFree86-truetype-fonts-4.3.0-2.90.43.i386.rpm
aa51b88ccb54f3cf3b93cc02271d107e 9/en/os/i386/XFree86-twm-4.3.0-2.90.43.i386.rpm
d6c6c99723f3711befd8071567f79550 9/en/os/i386/XFree86-xauth-4.3.0-2.90.43.i386.rpm
f3b70dbc805125764fb118e6bd81fd3a 9/en/os/i386/XFree86-xdm-4.3.0-2.90.43.i386.rpm
f97f679e9543b2506d41deff0afc2042 9/en/os/i386/XFree86-xfs-4.3.0-2.90.43.i386.rpm


These packages are GPG signed by Red Hat for security.  Our key is
available from https://www.redhat.com/security/keys.html

You can verify each package with the following command:
    
    rpm --checksig -v <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    
    md5sum <filename>


7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0690
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0692
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0730

8. Contact:

The Red Hat security contact is <secalert@...hat.com>.  More contact
details at https://www.redhat.com/solutions/security/news/contact.html

Copyright 2003 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQE/unmfXlSAg2UNWIIRAt/gAKCIiIxv0ak2lObXuHoIEjJEkmy1SACfX1W1
hyWtMD8nBSkGXyyC1bu6OWk=
=2PQ8
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ