Rapid7 Vulnerability & Exploit Database

RHSA-2003:067: Updated XFree86 packages provide security and bug fixes

Back to Search

RHSA-2003:067: Updated XFree86 packages provide security and bug fixes



New XFree86 packages for Red Hat Linux 8.0 are now available which include several security fixes, bug fixes, enhancements, and driver updates. [Updated: June 30, 2003] The XFree86 4.2.1-20 packages which were originally released in this advisory were accidentally built with debugging info enabled due to a temporary problem with our build system. Unfortunately, this problem was not noticed during package testing, and caused the new XFree86 packages to contain full debug symbol data, resulting in extremely large packages. Note that the previously released packages are functional and should not cause any problems on systems with adequate disk space. However we are releasing new XFree86 4.2.1-21 packages to both minimize the download time for people that have not yet updated XFree86 on their systems, and to minimize the disk space footprint caused by this issue. Additionally, our testing procedures have also been updated to automatically catch similar issues in the future. Red Hat apologizes for any inconvenience this may have caused you.

XFree86 is an implementation of the X Window System providing the core graphical user interface and video drivers in Red Hat Linux. A number of security vulnerabilities have been discovered in XFree86 4.2.0: - Xterm, provided as part of the XFree86 packages, provides an escape sequence for reporting the current window title. This escape sequence essentially takes the current title and places it directly on the command line. An attacker can craft an escape sequence that sets the victim's Xterm window title to an arbitrary command, and then reports it to the command line. Since it is not possible to embed a carriage return into the window title, the attacker would then have to convince the victim to press Enter for the shell to process the title as a command, although the attacker could craft other escape sequences that might convince the victim to do so. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0063 to this issue. - It is possible to lock up versions of Xterm by sending an invalid DEC UDK escape sequence. (CAN-2003-0071) - XFree86 4.2.1 also contains an updated fix for CAN-2002-0164, a vulnerability in the MIT-SHM extension of the X server that allows local users to read and write arbitrary shared memory. The original fix did not cover the case where the X server is started from xdm. - The X server was setting the /dev/dri directory permissions incorrectly, which resulted in the directory being world writable. It now sets the directory permissions to a safe value. (CAN-2001-1409) Driver updates and additions: - Savage driver updated to Tim Roberts' latest version 1.1.27t. - Added new "cyrix" driver from Alan Cox, which works much better on MediaGX hardware. - Added new input drivers from Alan Cox for Fujitsu Stylistic (fpit), Palmax PD1000/PD1100 Input driver (palmax), Union Reality UR-98 head tracker (ur98) - Backported apm driver from XFree86 CVS, DPMS support enhancements, and a few accel fixes - Backported ark driver from XFree86 CVS - Backported chips driver from XFree86 CVS, with hardware mouse cursor and 2D accleration fixes. - Backported cirrus i740, siliconmotion, and ark drivers from XFree86 CVS Various bug fixes and enhancements: - Bug fixes for the RENDER extension and libraries which improve stability - Various fixes to the Xaw library - A long standing problem in the X server has been fixed in which the mouse, keyboard, or video would hang, or the server to go into an endless loop whenever the system time was changed backward while X was running - Fixed a bug in both the Radeon and Rage 128 drivers which caused crashes while using VMware with DGA when DRI is enabled - The Matrox "mga" driver had some problems with multihead and the RENDER extension which have been worked around. - fc-cache is now run upon font package installation in all font directories containing fonts managed by fontconfig/Xft - mkfontdir has been modified to force the permissions of the files it generates to be mode 0644 ensuring they are world readable independant of umask. - Added a new option "ForceLegacyCRT" to the radeon driver to allow use of legacy VGA monitors which can not be detected automatically. This option is only safe to use in single-head setups and may cause serious problems if used with dual-head. - xterm session management is now enabled by default, whereas the stock XFree86 default in 4.2.0/4.2.1 was accidentally disabled upstream - Removed and obsoleted the XFree86-xtrap-clients package, and merged it into the main XFree86 package to simplify packaging There are various other fixes included which users can review by examining the RPM package changelog of any of the new XFree86 packages. Users are advised to upgrade to these updated XFree86 4.2.1 packages, which are not vulnerable to the previously mentioned security issues.


  • redhat-upgrade-xfree86
  • redhat-upgrade-xfree86-100dpi-fonts
  • redhat-upgrade-xfree86-75dpi-fonts
  • redhat-upgrade-xfree86-base-fonts
  • redhat-upgrade-xfree86-cyrillic-fonts
  • redhat-upgrade-xfree86-devel
  • redhat-upgrade-xfree86-doc
  • redhat-upgrade-xfree86-font-utils
  • redhat-upgrade-xfree86-iso8859-15-100dpi-fonts
  • redhat-upgrade-xfree86-iso8859-15-75dpi-fonts
  • redhat-upgrade-xfree86-iso8859-2-100dpi-fonts
  • redhat-upgrade-xfree86-iso8859-2-75dpi-fonts
  • redhat-upgrade-xfree86-iso8859-9-100dpi-fonts
  • redhat-upgrade-xfree86-iso8859-9-75dpi-fonts
  • redhat-upgrade-xfree86-libs
  • redhat-upgrade-xfree86-mesa-libgl
  • redhat-upgrade-xfree86-mesa-libglu
  • redhat-upgrade-xfree86-tools
  • redhat-upgrade-xfree86-truetype-fonts
  • redhat-upgrade-xfree86-twm
  • redhat-upgrade-xfree86-xauth
  • redhat-upgrade-xfree86-xdm
  • redhat-upgrade-xfree86-xfs
  • redhat-upgrade-xfree86-xnest
  • redhat-upgrade-xfree86-xvfb

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center