Summary: | local user DoS and arbitrary code execution as root [CVE-2006-0745] | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Product: | xorg | Reporter: | Daniel Stone <daniel> | ||||||||
Component: | Server/DDX/Xorg | Assignee: | Daniel Stone <daniel> | ||||||||
Status: | RESOLVED FIXED | QA Contact: | |||||||||
Severity: | critical | ||||||||||
Priority: | highest | CC: | ajax, alan.coopersmith, dnusinow, kem, matthieu.herrb, xorg_security | ||||||||
Version: | 7.0.0 | Keywords: | security | ||||||||
Hardware: | All | ||||||||||
OS: | All | ||||||||||
Whiteboard: | |||||||||||
i915 platform: | i915 features: | ||||||||||
Bug Depends on: | |||||||||||
Bug Blocks: | 5387 | ||||||||||
Attachments: |
|
Description
Daniel Stone
2006-03-10 19:24:45 UTC
ARGH! Default assignee of xorg-team will cause mails to be sent there too!! Created attachment 4894 [details] [review] obvious patch > introduced a couple of bugs. Specifically, the test for geteuid == 0 will never
> succeed, and the end result is that -logfile and -modulepath can be specified by
more accurately, never fail.
we would strongly prefer to not wait a month to unembargo this, so we can avoid
shipping FC5 with a local root exploit. who's actually shipping 7.0 in a stable
release?
Solaris is shipping 6.9 now, which is also affected. What timeline are you looking at? i think it's March 20, assuming we don't hit any more spectacular build system failures. so, ajax and alan, would an unembargo of friday the 17th give you sufficient time to get your fixes through the processes? (alternately, there could be an unembargo of friday the 20th, and rhat could just take care to not ship before 1400 utc ...) that would probably be fine for us, i'll check with rel-eng. When everyone here agrees with a new date, I'll inform vendor-sec. I could get a preliminary fix out that hadn't passed QA and a security alert telling people to just chmod 755 Xorg and only start it via gdm/xdm/dtlogin and not xinit. That's good enough for me to not object loudly. I would prefer Monday March 20, since the 17th is an official holiday in at least one country (and since part of our patch test/release team is in Ireland, they'll be out that day), and an unofficial party day in others, such as the US. ajax - are you going to release xorg-server-1.0.1 that day too? Should we bother with an entire monolith release just for this or just publish an advisory and patch with a note that it will be fixed in an upcoming 6.9.1 release? For the monolithic tree, an advisory with a patch is enough. This is how previous advisories were handled. I've added xorg_security@x.org in the Cc: so everyone gets attention to the discussion happening on bugzilla. i don't think an additional monolithic release is worthwhile, especially given the immense difficulty of same. so, are we agreed on the 20th for unembargo (standard time for unembargoing is 1400 UTC)? (In reply to comment #9) > ajax - are you going to release xorg-server-1.0.1 that day too? Should we > bother with an entire monolith release just for this or just publish an > advisory and patch with a note that it will be fixed in an upcoming 6.9.1 > release? whenever we push this i'll push 1.0.1 simultaneously, with the fix included. Right - I think the precedent of 6.8.1 for the single security fix was a bad one, and should not be followed in general. So everyone here agree to announce march 20 as new disclosure date to vendor-sec? we can work with march 20. march 20th would make our relengs a lot happier than april 6th. right, unembargo is march 20th, 2006, at 1400 UTC. Created attachment 4984 [details] [review] modular patch, fixed filename Created attachment 4985 [details] [review] patch against 6.9 embargo lifted. fixed in 1.0 branch and in HEAD. URLs for the fixed stable server: http://xorg.freedesktop.org/releases/individual/xserver/xorg-server-1.0.2.tar.gz http://xorg.freedesktop.org/releases/individual/xserver/xorg-server-1.0.2.tar.bz2 patches are at: http://xorg.freedesktop.org/releases/X11R7.0/patches/ http://xorg.freedesktop.org/releases/X11R6.9.0/patches/ md5 and sha1 in http://lists.freedesktop.org/archives/xorg/2006-March/013992.html (also gpg-signed, but the archives have probably stuffed that ten ways to tomorrow). |
Use of freedesktop.org services, including Bugzilla, is subject to our Code of Conduct. How we collect and use information is described in our Privacy Policy.