Jump to content
Compatible Support Forums
Sign in to follow this  
news

[Security Announce] [ MDVA-2009:005 ] x11-server

Recommended Posts

This is a multi-part message in MIME format...

 

------------=_1231193713-14940-7065

 

 

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

 

_______________________________________________________________________

 

Mandriva Linux Advisory MDVA-2009:005

http://www.mandriva.com/security/

_______________________________________________________________________

 

Package : x11-server

Date : January 5, 2009

Affected: 2009.0

_______________________________________________________________________

 

Problem Description:

 

This updated x11-server-xorg package provides the following fixes:

 

The OpenOffice.org application menu would trigger a bug in the X

server's xkb cache code causing it to crash (segfault).

 

Fake key events generated by the XTest extension would not change

the state of the keyboard leds. This would cause the numlock led to

be inverted when the enable_X11_numlock program was used (Mandriva's

default behaviour).

 

This update corrects both issues.

_______________________________________________________________________

 

Updated Packages:

 

Mandriva Linux 2009.0:

2a1e6950de2e48c9996874ebb20c89cc 2009.0/i586/x11-server-1.4.2-10.1mdv2009.0.i586.rpm

2d39305264ad6d2bcc83dea28814263f 2009.0/i586/x11-server-common-1.4.2-10.1mdv2009.0.i586.rpm

c28de0d166d529df7b00d37f8cbe30db 2009.0/i586/x11-server-devel-1.4.2-10.1mdv2009.0.i586.rpm

d98e1f0387f16a3b13dc4fc815d79dec 2009.0/i586/x11-server-xdmx-1.4.2-10.1mdv2009.0.i586.rpm

3910e7be1fd898f1b864f72446bb1d0f 2009.0/i586/x11-server-xephyr-1.4.2-10.1mdv2009.0.i586.rpm

8601761e57adf22777761db14e4421aa 2009.0/i586/x11-server-xfake-1.4.2-10.1mdv2009.0.i586.rpm

545d11561ee45969592f4ca85c19ab43 2009.0/i586/x11-server-xfbdev-1.4.2-10.1mdv2009.0.i586.rpm

993346c59720aabba6bac7f00438e353 2009.0/i586/x11-server-xnest-1.4.2-10.1mdv2009.0.i586.rpm

98ee9aa1b3b2c3a2710b6d39cfd79426 2009.0/i586/x11-server-xorg-1.4.2-10.1mdv2009.0.i586.rpm

f0a997c20fbc45058080af8986e1a1c1 2009.0/i586/x11-server-xsdl-1.4.2-10.1mdv2009.0.i586.rpm

4f647f701d79fee56627e1bc13ecba27 2009.0/i586/x11-server-xvfb-1.4.2-10.1mdv2009.0.i586.rpm

ed1f914cc7855167c2b7cafdd42002f8 2009.0/i586/x11-server-xvnc-1.4.2-10.1mdv2009.0.i586.rpm

27dca2ad5d52f789262d1b038f9b64cb 2009.0/SRPMS/x11-server-1.4.2-10.1mdv2009.0.src.rpm

 

Mandriva Linux 2009.0/X86_64:

51b8f420d23b03125d1e52cc56785488 2009.0/x86_64/x11-server-1.4.2-10.1mdv2009.0.x86_64.rpm

32eb0ebde89d4f1859cdbea277da1eb9 2009.0/x86_64/x11-server-common-1.4.2-10.1mdv2009.0.x86_64.rpm

809f69761135180ff4212aed4dbae7ee 2009.0/x86_64/x11-server-devel-1.4.2-10.1mdv2009.0.x86_64.rpm

c3f2129c2bc6b72938e138beb7b585ad 2009.0/x86_64/x11-server-xdmx-1.4.2-10.1mdv2009.0.x86_64.rpm

f16d25b1033d34957df002902c0bbf28 2009.0/x86_64/x11-server-xephyr-1.4.2-10.1mdv2009.0.x86_64.rpm

4cd750808d659fa2b1a604f8dcabcd9b 2009.0/x86_64/x11-server-xfake-1.4.2-10.1mdv2009.0.x86_64.rpm

b2b131e6be40b1fb0d5f1871fa3b2707 2009.0/x86_64/x11-server-xfbdev-1.4.2-10.1mdv2009.0.x86_64.rpm

be3d77de59fbaab77a20725d0d271a89 2009.0/x86_64/x11-server-xnest-1.4.2-10.1mdv2009.0.x86_64.rpm

ada8fa92f1746230b36762515270cb91 2009.0/x86_64/x11-server-xorg-1.4.2-10.1mdv2009.0.x86_64.rpm

5d89c93dc88e35b758edba11fe67eefe 2009.0/x86_64/x11-server-xsdl-1.4.2-10.1mdv2009.0.x86_64.rpm

f4a90a922bfee3360995a57176e81af1 2009.0/x86_64/x11-server-xvfb-1.4.2-10.1mdv2009.0.x86_64.rpm

1235ede43c685e16c362517621366b9b 2009.0/x86_64/x11-server-xvnc-1.4.2-10.1mdv2009.0.x86_64.rpm

27dca2ad5d52f789262d1b038f9b64cb 2009.0/SRPMS/x11-server-1.4.2-10.1mdv2009.0.src.rpm

_______________________________________________________________________

 

To upgrade automatically use MandrivaUpdate or urpmi. The verification

of md5 checksums and GPG signatures is performed automatically for you.

 

All packages are signed by Mandriva for security. You can obtain the

GPG public key of the Mandriva Security Team by executing:

 

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 

You can view other update advisories for Mandriva Linux at:

 

http://www.mandriva.com/security/advisories

 

If you want to report vulnerabilities, please contact

 

security_(at)_mandriva.com

_______________________________________________________________________

 

Type Bits/KeyID Date User ID

pub 1024D/22458A98 2000-07-10 Mandriva Security Team

 

-----BEGIN PGP SIGNATURE-----

Version: GnuPG v1.4.9 (GNU/Linux)

 

iD8DBQFJYlwOmqjQ0CJFipgRAj4UAJ485oKc6S0H7IuaNP5tsScz01y/6QCgyBYh

RxhN9hQzjOEdEVPyg4S33qM=

=zTIJ

-----END PGP SIGNATURE-----

 

 

------------=_1231193713-14940-7065

Content-Type: text/plain; name="message-footer.txt"

Content-Disposition: inline; filename="message-footer.txt"

Content-Transfer-Encoding: 8bit

 

To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org

with this subject : unsubscribe security-announce

_______________________________________________________

Want to buy your Pack or Services from Mandriva?

Go to http://www.mandrivastore.com

Join the Club : http://www.mandrivaclub.com

_______________________________________________________

 

------------=_1231193713-14940-7065--

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×