Published:
08 June 1998
Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-98.089 -- Red Hat Linux Bulletin SECURITY: new XFree86 packages now available 09 June 1998 =========================================================================== RedHat Software, Inc. has released the following advisory concerning major security holes found in the X libraries and xterm which may allow local users to gain root privileges. The following security bulletin is provided as a service to AusCERT's members. As AusCERT did not write this document, AusCERT has had no control over its content. As such, the decision to use any or all of this information is the responsibility of each user or organisation, and should be done so in accordance with site policies and procedures. NOTE: This is only the original release of the security bulletin. It will not be updated when the original bulletin is. If downloading at a later date, it is recommended that the bulletin is retrieved from the original authors to ensure that the information is still current. If you have any questions or need further information, please contact Red Hat Software directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/Information/advisories.html If you believe that your system has been compromised, contact AusCERT or your representative in FIRST (Forum of Incident Response and Security Teams). Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for emergencies. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Major security holes have been found in the X libraries and xterm, which allow local users access to the root user. All Red Hat 4.x and 5.x systems which X-Windows installed should update their systems. Packages for the SPARC are not yet available. When they are, we will post a separate announcement so sparc-list@redhat.com providing full information on those fixes. Thanks to the XFree86 group for providing patches for these problems. Red Hat 5.0 and 5.1 - - ------------------- i386: rpm -Uvh ftp://ftp.redhat.com/updates/5.0/i386/XFree86-3.3.2-11.i386.rpm rpm -Uvh ftp://ftp.redhat.com/updates/5.0/i386/XFree86-libs-3.3.2-11.i386.rpm alpha: rpm -Uvh ftp://ftp.redhat.com/updates/5.0/alpha/XFree86-3.3.2-11.alpha.rpm rpm -Uvh ftp://ftp.redhat.com/updates/5.0/alpha/XFree86-libs-3.3.2-11.alpha.rpm Red Hat 4.2 - - ------------- i386: rpm -Uvh ftp://ftp.redhat.com/updates/4.2/i386/XFree86-3.3.2-1.i386.rpm rpm -Uvh ftp://ftp.redhat.com/updates/4.2/i386/XFree86-libs-3.3.2-1.i386.rpm alpha: rpm -Uvh ftp://ftp.redhat.com/updates/4.2/alpha/XFree86-3.3.2-1.alpha.rpm rpm -Uvh ftp://ftp.redhat.com/updates/4.2/alpha/XFree86-libs-3.3.2-1.alpha.rpm - -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBNXgCQKUg6PHLopv5AQHotAP/aEZfyPZB9H4m0zYY03PvHqKwZq76699Z MIaDeURLma9fwc/ey1+2GASlm08mfFtTCIww5+RzbdE4dLsxNMXdKONnVFMMahe8 1sJaSzYQap1yphv1sUQCX/AFrlk/eC6UVhbYMYLTI/YAvt49/O2gZ3mrT0u2nZun JgoHSq8JUc4= =MY9C - -----END PGP SIGNATURE----- - ---------------------------END INCLUDED TEXT--------------------- -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key iQCVAwUBNYEdAih9+71yA2DNAQEHWQQAgxIdsJvYJaXs16Y3SbJW+KRTyUm90tfN Sv/CQRWFq01XUuJIx6QUym+OXwo4VwCuOdVbL0HJUc/cjqjekqIlB5xE9GvALJMl Sxkncn2x8vK5dxhcaMvkqIztqM5H8NkbmBp3oDqhHCKDMrK2N8RI6U66HiVsDNpb wVQ0xeicCT8= =I5wL -----END PGP SIGNATURE-----