<?xml version="1.0" encoding="utf-8"?> <!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> <glsa id="200503-15"> <title>X.org: libXpm vulnerability</title> <synopsis> A new vulnerability has been discovered in libXpm, which is included in X.org, that can potentially lead to remote code execution. </synopsis> <product type="ebuild">X.org</product> <announced>2005-03-12</announced> <revised count="02">2005-03-12</revised> <bug>83598</bug> <access>remote</access> <affected> <package name="x11-base/xorg-x11" auto="yes" arch="*"> <unaffected range="rge">6.8.0-r5</unaffected> <unaffected range="ge">6.8.2-r1</unaffected> <vulnerable range="lt">6.8.2-r1</vulnerable> </package> </affected> <background> <p> libXpm is a pixmap manipulation library for the X Window System, included in X.org. </p> </background> <description> <p> Chris Gilbert has discovered potentially exploitable buffer overflow cases in libXpm that weren't fixed in previous libXpm versions. </p> </description> <impact type="normal"> <p> A carefully-crafted XPM file could crash X.org, potentially allowing the execution of arbitrary code with the privileges of the user running the application. </p> </impact> <workaround> <p> There is no known workaround at this time. </p> </workaround> <resolution> <p> All X.org users should upgrade to the latest version: </p> <code> # emerge --sync # emerge --ask --oneshot --verbose x11-base/xorg-x11</code> </resolution> <references> <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0605">CAN-2005-0605</uri> <uri link="https://bugs.freedesktop.org/show_bug.cgi?id=1920">Freedesktop bug</uri> </references> <metadata tag="requester" timestamp="2005-03-06T13:19:18Z"> koon </metadata> <metadata tag="submitter" timestamp="2005-03-07T11:11:00Z"> SeJo </metadata> <metadata tag="bugReady" timestamp="2005-03-11T13:22:24Z"> jaervosz </metadata> </glsa>