A vulnerability has been discovered in the Composite extension of the X.Org X server, allowing for a local privilege escalation.
|Package||x11-base/xorg-server on all architectures|
|Affected versions||< 220.127.116.11-r1|
|Unaffected versions||>= 18.104.22.168-r1|
The X Window System is a graphical windowing system based on a client/server model.
Aaron Plattner discovered a buffer overflow in the compNewPixmap() function when copying data from a large pixel depth pixmap into a smaller pixel depth pixmap.
A local attacker could execute arbitrary code with the privileges of the user running the X server, typically root.
Disable the Composite extension by setting ' Option "Composite" "disable" ' in the Extensions section of xorg.conf.
Note: This could affect the functionality of some applications.
All X.Org X server users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=x11-base/xorg-server-22.214.171.124-r1"
October 14, 2007
October 14, 2007: 01