Gentoo Logo

OpenMotif, AMD64 x86 emulation X libraries: Buffer overflows in libUil library

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200512-16 / openmotif
Release Date December 28, 2005
Latest Revision January 29, 2006: 03
Impact low
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
x11-libs/openmotif < 2.2.3-r8 >= 2.2.3-r8, revision >= 2.1.30-r13 All supported architectures
app-emulation/emul-linux-x86-xlibs < 2.2.1 >= 2.2.1 AMD64

Related bugreports: #114234, #116481

Synopsis

Two buffer overflows have been discovered in libUil, part of the OpenMotif toolkit, that can potentially lead to the execution of arbitrary code.

2.  Impact Information

Background

OpenMotif provides a free version of the Motif toolkit for open source applications. The OpenMotif libraries are included in the AMD64 x86 emulation X libraries, which emulate the x86 (32-bit) architecture on the AMD64 (64-bit) architecture.

Description

xfocus discovered two potential buffer overflows in the libUil library, in the diag_issue_diagnostic and open_source_file functions.

Impact

Remotely-accessible or SUID applications making use of the affected functions might be exploited to execute arbitrary code with the privileges of the user running the application.

3.  Resolution Information

Workaround

There is no known workaround at this time.

Resolution

All OpenMotif users should upgrade to an unaffected version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --unmerge --verbose x11-libs/openmotif
# emerge --ask --oneshot --verbose x11-libs/openmotif

All AMD64 x86 emulation X libraries users should upgrade to the latest version:

Code Listing 3.2: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose app-emulation/emul-linux-x86-xlibs

4.  References



Print

Page updated December 28, 2005

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.