Jump to content
Compatible Support Forums
Sign in to follow this  
news

[Security Announce] [ MDVA-2008:108 ] - Updated x11-server packages fix offscreen pixmaps drawing issue

Recommended Posts

This is a multi-part message in MIME format...

 

------------=_1216180854-11275-7411

 

 

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

 

_______________________________________________________________________

 

Mandriva Linux Advisory MDVA-2008:108

http://www.mandriva.com/security/

_______________________________________________________________________

 

Package : x11-server

Date : July 15, 2008

Affected: 2008.1

_______________________________________________________________________

 

Problem Description:

 

This x11-sever update disables offscreen pixmaps by default as they

were causing drawing issues with Firefox 3 and other applications.

To re-enable this option, use 'Option XaaOffscreenPixmaps on'

in xorg.conf.

_______________________________________________________________________

 

Updated Packages:

 

Mandriva Linux 2008.1:

7e532b4eb9d54849e8d741404f8bcb07 2008.1/i586/x11-server-1.4.0.90-13.3mdv2008.1.i586.rpm

fd02e1e0b63a8524a608e286e7077a0a 2008.1/i586/x11-server-common-1.4.0.90-13.3mdv2008.1.i586.rpm

87da968a1e4f0b6305e3663ef2dafe22 2008.1/i586/x11-server-devel-1.4.0.90-13.3mdv2008.1.i586.rpm

38f2391affca85fe0d01a6028aecc233 2008.1/i586/x11-server-xati-1.4.0.90-13.3mdv2008.1.i586.rpm

f70b2ce1d47ffbc2fc43cbc06bdd9d57 2008.1/i586/x11-server-xchips-1.4.0.90-13.3mdv2008.1.i586.rpm

b79f795d3036924f519f3787bc479326 2008.1/i586/x11-server-xephyr-1.4.0.90-13.3mdv2008.1.i586.rpm

61ea22a43318f4bbfb1a397d8d0a0651 2008.1/i586/x11-server-xepson-1.4.0.90-13.3mdv2008.1.i586.rpm

38137a5386a513edb04acc82afcb57aa 2008.1/i586/x11-server-xfake-1.4.0.90-13.3mdv2008.1.i586.rpm

385a4a6aa9bf1e3964605e90c6e5f129 2008.1/i586/x11-server-xfbdev-1.4.0.90-13.3mdv2008.1.i586.rpm

3dec91bb1e5a2f667619057282fd91c9 2008.1/i586/x11-server-xi810-1.4.0.90-13.3mdv2008.1.i586.rpm

1aa5b32506b323a8c410531da7a5e1ad 2008.1/i586/x11-server-xmach64-1.4.0.90-13.3mdv2008.1.i586.rpm

ee55b7acc14f90a01a12468c9e2375a7 2008.1/i586/x11-server-xmga-1.4.0.90-13.3mdv2008.1.i586.rpm

8ec43ab2dff84bc198b880dce3421366 2008.1/i586/x11-server-xnest-1.4.0.90-13.3mdv2008.1.i586.rpm

89bec6263aa2fea297179f11f465796f 2008.1/i586/x11-server-xnvidia-1.4.0.90-13.3mdv2008.1.i586.rpm

5a593d8fef506ddfb3fa3c15860e76bc 2008.1/i586/x11-server-xorg-1.4.0.90-13.3mdv2008.1.i586.rpm

95f07e67232427c13aff1fcaec1382f8 2008.1/i586/x11-server-xpm2-1.4.0.90-13.3mdv2008.1.i586.rpm

da3f42ceb98074fc48a28620a4fc7772 2008.1/i586/x11-server-xr128-1.4.0.90-13.3mdv2008.1.i586.rpm

64a7c5f63447f26ee1157b5043d98563 2008.1/i586/x11-server-xsdl-1.4.0.90-13.3mdv2008.1.i586.rpm

85611b138113dd8f443e136be36ab949 2008.1/i586/x11-server-xsmi-1.4.0.90-13.3mdv2008.1.i586.rpm

9d206216085c05cb9a55d6c5d046c251 2008.1/i586/x11-server-xvesa-1.4.0.90-13.3mdv2008.1.i586.rpm

cb9742fc3bbd0332432464baddafff64 2008.1/i586/x11-server-xvfb-1.4.0.90-13.3mdv2008.1.i586.rpm

21502ded802d837d224837bba2d56902 2008.1/i586/x11-server-xvia-1.4.0.90-13.3mdv2008.1.i586.rpm

e701c8142c0cb34bee4786a48d740448 2008.1/i586/x11-server-xvnc-1.4.0.90-13.3mdv2008.1.i586.rpm

b7f87e5b27a5df036fa755956c0bb250 2008.1/SRPMS/x11-server-1.4.0.90-13.3mdv2008.1.src.rpm

 

Mandriva Linux 2008.1/X86_64:

219ecaaa0cacf2ad29c220d55d57310e 2008.1/x86_64/x11-server-1.4.0.90-13.3mdv2008.1.x86_64.rpm

b3016b761110c020e0995dfd0de1128b 2008.1/x86_64/x11-server-common-1.4.0.90-13.3mdv2008.1.x86_64.rpm

ed71855e3319a682c04d8df15cb7a219 2008.1/x86_64/x11-server-devel-1.4.0.90-13.3mdv2008.1.x86_64.rpm

c8ff939af44bae1feb9c444de7508d41 2008.1/x86_64/x11-server-xephyr-1.4.0.90-13.3mdv2008.1.x86_64.rpm

2388bffb52ad80647069ad09b4381b69 2008.1/x86_64/x11-server-xfake-1.4.0.90-13.3mdv2008.1.x86_64.rpm

29fb9a2904ffa21a6381b8c777f0479b 2008.1/x86_64/x11-server-xfbdev-1.4.0.90-13.3mdv2008.1.x86_64.rpm

b5da7fee8fbb8f24f9720f8aaa821c27 2008.1/x86_64/x11-server-xnest-1.4.0.90-13.3mdv2008.1.x86_64.rpm

625e2b755cb784187a6f1207c2e52e9a 2008.1/x86_64/x11-server-xorg-1.4.0.90-13.3mdv2008.1.x86_64.rpm

356d31a0715a693cfee4457568918ae2 2008.1/x86_64/x11-server-xsdl-1.4.0.90-13.3mdv2008.1.x86_64.rpm

7bc8dae88b3904c5071d9b4440a2c372 2008.1/x86_64/x11-server-xvfb-1.4.0.90-13.3mdv2008.1.x86_64.rpm

7c39b7b407b024da1dcbf01fa07159fb 2008.1/x86_64/x11-server-xvnc-1.4.0.90-13.3mdv2008.1.x86_64.rpm

b7f87e5b27a5df036fa755956c0bb250 2008.1/SRPMS/x11-server-1.4.0.90-13.3mdv2008.1.src.rpm

_______________________________________________________________________

 

To upgrade automatically use MandrivaUpdate or urpmi. The verification

of md5 checksums and GPG signatures is performed automatically for you.

 

All packages are signed by Mandriva for security. You can obtain the

GPG public key of the Mandriva Security Team by executing:

 

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 

You can view other update advisories for Mandriva Linux at:

 

http://www.mandriva.com/security/advisories

 

If you want to report vulnerabilities, please contact

 

security_(at)_mandriva.com

_______________________________________________________________________

 

Type Bits/KeyID Date User ID

pub 1024D/22458A98 2000-07-10 Mandriva Security Team

 

-----BEGIN PGP SIGNATURE-----

Version: GnuPG v1.4.9 (GNU/Linux)

 

iD8DBQFIfUf8mqjQ0CJFipgRAnVtAJ9lz4Lg2ZURtH1XvMYm3l1jNMVSyACg7oCe

2NXDYM8KonhIxD7xrYKqdYo=

=mW2q

-----END PGP SIGNATURE-----

 

 

------------=_1216180854-11275-7411

Content-Type: text/plain; name="message-footer.txt"

Content-Disposition: inline; filename="message-footer.txt"

Content-Transfer-Encoding: 8bit

 

To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org

with this subject : unsubscribe security-announce

_______________________________________________________

Want to buy your Pack or Services from Mandriva?

Go to http://www.mandrivastore.com

Join the Club : http://www.mandrivaclub.com

_______________________________________________________

 

------------=_1216180854-11275-7411--

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×