Jump to content
Compatible Support Forums
Sign in to follow this  
news

[Security Announce] [ MDVA-2008:126 ] x11-server

Recommended Posts

This is a multi-part message in MIME format...

 

------------=_1221610237-11275-9314

 

 

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

 

_______________________________________________________________________

 

Mandriva Linux Advisory MDVA-2008:126

http://www.mandriva.com/security/

_______________________________________________________________________

 

Package : x11-server

Date : September 16, 2008

Affected: 2008.1

_______________________________________________________________________

 

Problem Description:

 

A Xvnc server running in 16 bpp depth would crash when a client with

16 bpp depth connected. Also, keyboard behaviour was incorrect when

the X server was run with Xkb extension disabled.

 

This update fixes both issues.

_______________________________________________________________________

 

Updated Packages:

 

Mandriva Linux 2008.1:

075173f9cdf18385cc183dedf8fd186e 2008.1/i586/x11-server-1.4.0.90-14.4mdv2008.1.i586.rpm

c3de176166f68e721b2fef4cd12e365f 2008.1/i586/x11-server-common-1.4.0.90-14.4mdv2008.1.i586.rpm

e3579f4142d1bc08792bd6fd6865a162 2008.1/i586/x11-server-devel-1.4.0.90-14.4mdv2008.1.i586.rpm

9c3d4cdc3a134370254ce0fabdec9226 2008.1/i586/x11-server-xati-1.4.0.90-14.4mdv2008.1.i586.rpm

b57aee0b9e1f6ee2369a9b895ebf3a75 2008.1/i586/x11-server-xchips-1.4.0.90-14.4mdv2008.1.i586.rpm

b2e0472c6445a281c30e65516eff0230 2008.1/i586/x11-server-xephyr-1.4.0.90-14.4mdv2008.1.i586.rpm

b886b67eaeb7eb9a44581307860cbea8 2008.1/i586/x11-server-xepson-1.4.0.90-14.4mdv2008.1.i586.rpm

5b2a47aedfb4c6a13e6916db03e826e6 2008.1/i586/x11-server-xfake-1.4.0.90-14.4mdv2008.1.i586.rpm

bff2332ae061dd87737cf54add0c7c22 2008.1/i586/x11-server-xfbdev-1.4.0.90-14.4mdv2008.1.i586.rpm

18d69818c3ce15e94b9d017a8f1b7ae1 2008.1/i586/x11-server-xi810-1.4.0.90-14.4mdv2008.1.i586.rpm

658675925d9bb7636c2a0c50a6cabc7b 2008.1/i586/x11-server-xmach64-1.4.0.90-14.4mdv2008.1.i586.rpm

c9a372b4a137cfc4527505f10b5b49fa 2008.1/i586/x11-server-xmga-1.4.0.90-14.4mdv2008.1.i586.rpm

c49c18090fdade17db3ed5ed1ef1155c 2008.1/i586/x11-server-xnest-1.4.0.90-14.4mdv2008.1.i586.rpm

671857cc1f7134059bf868718a8cee45 2008.1/i586/x11-server-xnvidia-1.4.0.90-14.4mdv2008.1.i586.rpm

93d004a780fa3809462a55ed7768d91a 2008.1/i586/x11-server-xorg-1.4.0.90-14.4mdv2008.1.i586.rpm

29fb68598478ad94b1103d657d96110e 2008.1/i586/x11-server-xpm2-1.4.0.90-14.4mdv2008.1.i586.rpm

e4e5a2022f402bb50018f578105289f5 2008.1/i586/x11-server-xr128-1.4.0.90-14.4mdv2008.1.i586.rpm

9f608f1a240a0d39251f37722b8982e1 2008.1/i586/x11-server-xsdl-1.4.0.90-14.4mdv2008.1.i586.rpm

fc398df80471b067f45ed00ca70f9bee 2008.1/i586/x11-server-xsmi-1.4.0.90-14.4mdv2008.1.i586.rpm

3513209f85416fddaae784572bd3a1c5 2008.1/i586/x11-server-xvesa-1.4.0.90-14.4mdv2008.1.i586.rpm

18317c64dba4db0285d6b0248c8bd86e 2008.1/i586/x11-server-xvfb-1.4.0.90-14.4mdv2008.1.i586.rpm

512a0e195619610e73bc18f7144c78ab 2008.1/i586/x11-server-xvia-1.4.0.90-14.4mdv2008.1.i586.rpm

0991692648bf14ca032592867053c347 2008.1/i586/x11-server-xvnc-1.4.0.90-14.4mdv2008.1.i586.rpm

72663bb409c51be61be990ccc57d00f3 2008.1/SRPMS/x11-server-1.4.0.90-14.4mdv2008.1.src.rpm

 

Mandriva Linux 2008.1/X86_64:

e753cd1e5ebe08cf326729fb56eb5391 2008.1/x86_64/x11-server-1.4.0.90-14.4mdv2008.1.x86_64.rpm

63a95d76c6e1189bf5b797a8d66b5c1e 2008.1/x86_64/x11-server-common-1.4.0.90-14.4mdv2008.1.x86_64.rpm

0a87961b2b9f0e3edc57ee61fc65180f 2008.1/x86_64/x11-server-devel-1.4.0.90-14.4mdv2008.1.x86_64.rpm

a375ad1fe60d170ffba282616f0add98 2008.1/x86_64/x11-server-xephyr-1.4.0.90-14.4mdv2008.1.x86_64.rpm

a52769bf3df1c02037035196a7f67689 2008.1/x86_64/x11-server-xfake-1.4.0.90-14.4mdv2008.1.x86_64.rpm

fad0988d0cd5f4d1568d2da7be6a0dcf 2008.1/x86_64/x11-server-xfbdev-1.4.0.90-14.4mdv2008.1.x86_64.rpm

15b978ab7fcb25dce50eff7229f402f9 2008.1/x86_64/x11-server-xnest-1.4.0.90-14.4mdv2008.1.x86_64.rpm

0ff02ddccb8cd44bdded6e09d7769a37 2008.1/x86_64/x11-server-xorg-1.4.0.90-14.4mdv2008.1.x86_64.rpm

86d888c6d9b58789b40013199175c881 2008.1/x86_64/x11-server-xsdl-1.4.0.90-14.4mdv2008.1.x86_64.rpm

19721eb9ce7d5ab18067cd62fcde6b0e 2008.1/x86_64/x11-server-xvfb-1.4.0.90-14.4mdv2008.1.x86_64.rpm

3ff0a35e5c1e69e1dc09b43065a1aa56 2008.1/x86_64/x11-server-xvnc-1.4.0.90-14.4mdv2008.1.x86_64.rpm

72663bb409c51be61be990ccc57d00f3 2008.1/SRPMS/x11-server-1.4.0.90-14.4mdv2008.1.src.rpm

_______________________________________________________________________

 

To upgrade automatically use MandrivaUpdate or urpmi. The verification

of md5 checksums and GPG signatures is performed automatically for you.

 

All packages are signed by Mandriva for security. You can obtain the

GPG public key of the Mandriva Security Team by executing:

 

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 

You can view other update advisories for Mandriva Linux at:

 

http://www.mandriva.com/security/advisories

 

If you want to report vulnerabilities, please contact

 

security_(at)_mandriva.com

_______________________________________________________________________

 

Type Bits/KeyID Date User ID

pub 1024D/22458A98 2000-07-10 Mandriva Security Team

 

-----BEGIN PGP SIGNATURE-----

Version: GnuPG v1.4.9 (GNU/Linux)

 

iD8DBQFI0CA9mqjQ0CJFipgRAmsfAJ9xnddPRo5LDlxwVnmUjLTd/rhJcQCgqwa4

d/vf0vxn+2ejCbpkMSMHjlw=

=tkjZ

-----END PGP SIGNATURE-----

 

 

------------=_1221610237-11275-9314

Content-Type: text/plain; name="message-footer.txt"

Content-Disposition: inline; filename="message-footer.txt"

Content-Transfer-Encoding: 8bit

 

To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org

with this subject : unsubscribe security-announce

_______________________________________________________

Want to buy your Pack or Services from Mandriva?

Go to http://www.mandrivastore.com

Join the Club : http://www.mandrivaclub.com

_______________________________________________________

 

------------=_1221610237-11275-9314--

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×