Jump to content
Compatible Support Forums
Sign in to follow this  
news

[Security Announce] [ MDVSA-2008:115 ] - Updated x11-server packages fix several vulnerabilities

Recommended Posts

This is a multi-part message in MIME format...

 

------------=_1213646456-11275-6222

 

 

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

 

_______________________________________________________________________

 

Mandriva Linux Security Advisory MDVSA-2008:115

http://www.mandriva.com/security/

_______________________________________________________________________

 

Package : XFree86

Date : June 16, 2008

Affected: Corporate 3.0

_______________________________________________________________________

 

Problem Description:

 

An input validation flaw was found in X.org's Security and Record

extensions. A malicious authorized client could exploit the issue

to cause a denial of service (crash) or possibly execute arbitrary

code with root privileges on the X.org server (CVE-2008-1377).

 

An input validation flaw was found in X.org's MIT-SHM extension.

A client connected to the X.org server could read arbitrary server

memory, resulting in the disclosure of sensitive data of other users

of the X.org server (CVE-2008-1379).

 

Multiple integer overflows were found in X.org's Render extension.

A malicious authorized client could explot these issues to cause a

denial of service (crash) or possibly execute arbitrary code with

root privileges on the X.org server (CVE-2008-2360, CVE-2008-2361).

 

The updated packages have been patched to prevent these issues.

_______________________________________________________________________

 

References:

 

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1377

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1379

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2360

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2361

_______________________________________________________________________

 

Updated Packages:

 

Corporate 3.0:

a305bb0ad6cd2be60f7adedd5e164411 corporate/3.0/i586/libxfree86-4.3-32.16.C30mdk.i586.rpm

27f01f163d1d8cb6fd33e852de531a1a corporate/3.0/i586/libxfree86-devel-4.3-32.16.C30mdk.i586.rpm

19c3b2641c0aa86a21049e90c2b3ccd9 corporate/3.0/i586/libxfree86-static-devel-4.3-32.16.C30mdk.i586.rpm

4a0413a3568d7dc418b2d1c2468177ea corporate/3.0/i586/X11R6-contrib-4.3-32.16.C30mdk.i586.rpm

54b2492a5c3b21fa05587adff48aa080 corporate/3.0/i586/XFree86-100dpi-fonts-4.3-32.16.C30mdk.i586.rpm

687c21c83530c0d8d306b0c180b0a8d8 corporate/3.0/i586/XFree86-4.3-32.16.C30mdk.i586.rpm

d3c807bae1c0b26c40043f3a395df345 corporate/3.0/i586/XFree86-75dpi-fonts-4.3-32.16.C30mdk.i586.rpm

78ad2ccdaa585998aff8382d80a611e2 corporate/3.0/i586/XFree86-cyrillic-fonts-4.3-32.16.C30mdk.i586.rpm

9526a9761a714042287a6021438ecbb3 corporate/3.0/i586/XFree86-doc-4.3-32.16.C30mdk.i586.rpm

d234ed69212ada78d4e89fbbb9a37c0f corporate/3.0/i586/XFree86-glide-module-4.3-32.16.C30mdk.i586.rpm

b347db273e18d7d6500b5a4850b3b31c corporate/3.0/i586/XFree86-server-4.3-32.16.C30mdk.i586.rpm

8628b4470e7324c2ddc933ed81261fcd corporate/3.0/i586/XFree86-xfs-4.3-32.16.C30mdk.i586.rpm

06a7a3a7d44d37364d41ebfcd97708c8 corporate/3.0/i586/XFree86-Xnest-4.3-32.16.C30mdk.i586.rpm

6334310368ddee26fd3727222a88f016 corporate/3.0/i586/XFree86-Xvfb-4.3-32.16.C30mdk.i586.rpm

e0cc44b644c9f867f1f89b4a4fb61de2 corporate/3.0/SRPMS/XFree86-4.3-32.16.C30mdk.src.rpm

 

Corporate 3.0/X86_64:

fdae8ca675e6a92d5f3e6a3e12f8dabe corporate/3.0/x86_64/lib64xfree86-4.3-32.16.C30mdk.x86_64.rpm

80fe75f04ad54d8e2579cd11714b9079 corporate/3.0/x86_64/lib64xfree86-devel-4.3-32.16.C30mdk.x86_64.rpm

5b7669cd92060f8e4bb3bb78d366654f corporate/3.0/x86_64/lib64xfree86-static-devel-4.3-32.16.C30mdk.x86_64.rpm

65b98282d535bf04971e11ee5f8bff44 corporate/3.0/x86_64/X11R6-contrib-4.3-32.16.C30mdk.x86_64.rpm

9ad69cc110dc9bc3f9c2d37d2b157a68 corporate/3.0/x86_64/XFree86-100dpi-fonts-4.3-32.16.C30mdk.x86_64.rpm

35d8852fd52f67a3db58cfbb71d88b95 corporate/3.0/x86_64/XFree86-4.3-32.16.C30mdk.x86_64.rpm

0db3d42580a476faee7202b48a546586 corporate/3.0/x86_64/XFree86-75dpi-fonts-4.3-32.16.C30mdk.x86_64.rpm

1bde0c17d8b6f99bbb1060695395e79e corporate/3.0/x86_64/XFree86-cyrillic-fonts-4.3-32.16.C30mdk.x86_64.rpm

f38e44512019a5b9f13c9bd19d827e56 corporate/3.0/x86_64/XFree86-doc-4.3-32.16.C30mdk.x86_64.rpm

b36b4dc06a9f52b3842910f5783c7f3b corporate/3.0/x86_64/XFree86-server-4.3-32.16.C30mdk.x86_64.rpm

498d4e9e3d4840fb8ef41c854180f954 corporate/3.0/x86_64/XFree86-xfs-4.3-32.16.C30mdk.x86_64.rpm

0526b4c13823d7562f53087a1a5d1dac corporate/3.0/x86_64/XFree86-Xnest-4.3-32.16.C30mdk.x86_64.rpm

143b310524114a3887e034878a2be14d corporate/3.0/x86_64/XFree86-Xvfb-4.3-32.16.C30mdk.x86_64.rpm

e0cc44b644c9f867f1f89b4a4fb61de2 corporate/3.0/SRPMS/XFree86-4.3-32.16.C30mdk.src.rpm

_______________________________________________________________________

 

To upgrade automatically use MandrivaUpdate or urpmi. The verification

of md5 checksums and GPG signatures is performed automatically for you.

 

All packages are signed by Mandriva for security. You can obtain the

GPG public key of the Mandriva Security Team by executing:

 

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 

You can view other update advisories for Mandriva Linux at:

 

http://www.mandriva.com/security/advisories

 

If you want to report vulnerabilities, please contact

 

security_(at)_mandriva.com

_______________________________________________________________________

 

Type Bits/KeyID Date User ID

pub 1024D/22458A98 2000-07-10 Mandriva Security Team

 

-----BEGIN PGP SIGNATURE-----

Version: GnuPG v1.4.9 (GNU/Linux)

 

iD8DBQFIVprwmqjQ0CJFipgRAm5qAJ9LC+6u7y+7mu/WWvhEljhK2ZGyXACfanhh

dxlwGggq7YoB37Ung4mF7A8=

=mbny

-----END PGP SIGNATURE-----

 

 

------------=_1213646456-11275-6222

Content-Type: text/plain; name="message-footer.txt"

Content-Disposition: inline; filename="message-footer.txt"

Content-Transfer-Encoding: 8bit

 

To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org

with this subject : unsubscribe security-announce

_______________________________________________________

Want to buy your Pack or Services from Mandriva?

Go to http://www.mandrivastore.com

Join the Club : http://www.mandrivaclub.com

_______________________________________________________

 

------------=_1213646456-11275-6222--

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×