Red Hat patches critical hole

    Date04 Apr 2005
    Posted ByBrittany Day
    Red Hat is warning enterprise Linux users to update their installations of XFree86 to fix a number of serious security bugs, some of which could allow attackers to take over a system.

    The affected operating systems include Enterprise Linux AS 3, Enterprise Linux ES 3 and Enterprise Linux WS 3, Red Hat said in an advisory.

    Separately, vendors have patched critical flaws in ImageMagick, Sylpheed and several components of Silicon Graphics Inc.'s Advanced Linux Environment.

    XFree86 is an implementation of the X Window System providing low-level graphics functionality for graphical user interface systems such as KDE and GNOME. The most serious flaw is an integer overflow in the libXpm library, which is used by some applications in opening XPM images, Red Hat said. An attacker could use a malicious XPM file to execute code on a user's system.

    Red Hat said the bug is moderately critical, but independent security firm Secunia said in an advisory that the vulnerability is serious because it could allow a remote attacker to gain system access. The latest XFree86 release, issued on March 16, fixes the libXpm vulnerability and several others.

    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"67","type":"x","order":"1","pct":57.76,"resources":[]},{"id":"88","title":"Should be more technical","votes":"15","type":"x","order":"2","pct":12.93,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"34","type":"x","order":"3","pct":29.31,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.