exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 3160-1

Debian Security Advisory 3160-1
Posted Feb 12, 2015
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3160-1 - Olivier Fourdan discovered that missing input validation in the Xserver's handling of XkbSetGeometry requests may result in an information leak or denial of service.

tags | advisory, denial of service
systems | linux, debian
advisories | CVE-2015-0255
SHA-256 | a8c6a3b27aaa3ff3ec4661dad807a413a2b37a89aa34950221b7a1e87856681f

Debian Security Advisory 3160-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3160-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
February 11, 2015 http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : xorg-server
CVE ID : CVE-2015-0255

Olivier Fourdan discovered that missing input validation in the Xserver's
handling of XkbSetGeometry requests may result in an information leak
or denial of service.

For the stable distribution (wheezy), this problem has been fixed in
version 2:1.12.4-6+deb7u6.

For the unstable distribution (sid), this problem has been fixed in
version 2:1.16.4-1.

We recommend that you upgrade your xorg-server packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=eFM3
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    0 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    0 Files
  • 5
    Sep 5th
    0 Files
  • 6
    Sep 6th
    0 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close