news 28 Posted January 5, 2009 This is a multi-part message in MIME format... ------------=_1231193713-14940-7065 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Advisory MDVA-2009:005 http://www.mandriva.com/security/ _______________________________________________________________________ Package : x11-server Date : January 5, 2009 Affected: 2009.0 _______________________________________________________________________ Problem Description: This updated x11-server-xorg package provides the following fixes: The OpenOffice.org application menu would trigger a bug in the X server's xkb cache code causing it to crash (segfault). Fake key events generated by the XTest extension would not change the state of the keyboard leds. This would cause the numlock led to be inverted when the enable_X11_numlock program was used (Mandriva's default behaviour). This update corrects both issues. _______________________________________________________________________ Updated Packages: Mandriva Linux 2009.0: 2a1e6950de2e48c9996874ebb20c89cc 2009.0/i586/x11-server-1.4.2-10.1mdv2009.0.i586.rpm 2d39305264ad6d2bcc83dea28814263f 2009.0/i586/x11-server-common-1.4.2-10.1mdv2009.0.i586.rpm c28de0d166d529df7b00d37f8cbe30db 2009.0/i586/x11-server-devel-1.4.2-10.1mdv2009.0.i586.rpm d98e1f0387f16a3b13dc4fc815d79dec 2009.0/i586/x11-server-xdmx-1.4.2-10.1mdv2009.0.i586.rpm 3910e7be1fd898f1b864f72446bb1d0f 2009.0/i586/x11-server-xephyr-1.4.2-10.1mdv2009.0.i586.rpm 8601761e57adf22777761db14e4421aa 2009.0/i586/x11-server-xfake-1.4.2-10.1mdv2009.0.i586.rpm 545d11561ee45969592f4ca85c19ab43 2009.0/i586/x11-server-xfbdev-1.4.2-10.1mdv2009.0.i586.rpm 993346c59720aabba6bac7f00438e353 2009.0/i586/x11-server-xnest-1.4.2-10.1mdv2009.0.i586.rpm 98ee9aa1b3b2c3a2710b6d39cfd79426 2009.0/i586/x11-server-xorg-1.4.2-10.1mdv2009.0.i586.rpm f0a997c20fbc45058080af8986e1a1c1 2009.0/i586/x11-server-xsdl-1.4.2-10.1mdv2009.0.i586.rpm 4f647f701d79fee56627e1bc13ecba27 2009.0/i586/x11-server-xvfb-1.4.2-10.1mdv2009.0.i586.rpm ed1f914cc7855167c2b7cafdd42002f8 2009.0/i586/x11-server-xvnc-1.4.2-10.1mdv2009.0.i586.rpm 27dca2ad5d52f789262d1b038f9b64cb 2009.0/SRPMS/x11-server-1.4.2-10.1mdv2009.0.src.rpm Mandriva Linux 2009.0/X86_64: 51b8f420d23b03125d1e52cc56785488 2009.0/x86_64/x11-server-1.4.2-10.1mdv2009.0.x86_64.rpm 32eb0ebde89d4f1859cdbea277da1eb9 2009.0/x86_64/x11-server-common-1.4.2-10.1mdv2009.0.x86_64.rpm 809f69761135180ff4212aed4dbae7ee 2009.0/x86_64/x11-server-devel-1.4.2-10.1mdv2009.0.x86_64.rpm c3f2129c2bc6b72938e138beb7b585ad 2009.0/x86_64/x11-server-xdmx-1.4.2-10.1mdv2009.0.x86_64.rpm f16d25b1033d34957df002902c0bbf28 2009.0/x86_64/x11-server-xephyr-1.4.2-10.1mdv2009.0.x86_64.rpm 4cd750808d659fa2b1a604f8dcabcd9b 2009.0/x86_64/x11-server-xfake-1.4.2-10.1mdv2009.0.x86_64.rpm b2b131e6be40b1fb0d5f1871fa3b2707 2009.0/x86_64/x11-server-xfbdev-1.4.2-10.1mdv2009.0.x86_64.rpm be3d77de59fbaab77a20725d0d271a89 2009.0/x86_64/x11-server-xnest-1.4.2-10.1mdv2009.0.x86_64.rpm ada8fa92f1746230b36762515270cb91 2009.0/x86_64/x11-server-xorg-1.4.2-10.1mdv2009.0.x86_64.rpm 5d89c93dc88e35b758edba11fe67eefe 2009.0/x86_64/x11-server-xsdl-1.4.2-10.1mdv2009.0.x86_64.rpm f4a90a922bfee3360995a57176e81af1 2009.0/x86_64/x11-server-xvfb-1.4.2-10.1mdv2009.0.x86_64.rpm 1235ede43c685e16c362517621366b9b 2009.0/x86_64/x11-server-xvnc-1.4.2-10.1mdv2009.0.x86_64.rpm 27dca2ad5d52f789262d1b038f9b64cb 2009.0/SRPMS/x11-server-1.4.2-10.1mdv2009.0.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFJYlwOmqjQ0CJFipgRAj4UAJ485oKc6S0H7IuaNP5tsScz01y/6QCgyBYh RxhN9hQzjOEdEVPyg4S33qM= =zTIJ -----END PGP SIGNATURE----- ------------=_1231193713-14940-7065 Content-Type: text/plain; name="message-footer.txt" Content-Disposition: inline; filename="message-footer.txt" Content-Transfer-Encoding: 8bit To unsubscribe, send a email to sympa ( -at -) mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://www.mandrivastore.com Join the Club : http://www.mandrivaclub.com _______________________________________________________ ------------=_1231193713-14940-7065-- Share this post Link to post