Gentoo Logo

OpenMotif, AMD64 x86 emulation X libraries: Buffer overflows in libUil library


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200512-16 / openmotif
Release Date December 28, 2005
Latest Revision January 29, 2006: 03
Impact low
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
x11-libs/openmotif < 2.2.3-r8 >= 2.2.3-r8, revision >= 2.1.30-r13 All supported architectures
app-emulation/emul-linux-x86-xlibs < 2.2.1 >= 2.2.1 AMD64

Related bugreports: #114234, #116481


Two buffer overflows have been discovered in libUil, part of the OpenMotif toolkit, that can potentially lead to the execution of arbitrary code.

2.  Impact Information


OpenMotif provides a free version of the Motif toolkit for open source applications. The OpenMotif libraries are included in the AMD64 x86 emulation X libraries, which emulate the x86 (32-bit) architecture on the AMD64 (64-bit) architecture.


xfocus discovered two potential buffer overflows in the libUil library, in the diag_issue_diagnostic and open_source_file functions.


Remotely-accessible or SUID applications making use of the affected functions might be exploited to execute arbitrary code with the privileges of the user running the application.

3.  Resolution Information


There is no known workaround at this time.


All OpenMotif users should upgrade to an unaffected version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --unmerge --verbose x11-libs/openmotif
# emerge --ask --oneshot --verbose x11-libs/openmotif

All AMD64 x86 emulation X libraries users should upgrade to the latest version:

Code Listing 3.2: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose app-emulation/emul-linux-x86-xlibs

4.  References


Page updated December 28, 2005

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.