exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 28592

Secunia Security Advisory 28592
Posted Jan 24, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for xorg-x11-server. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, or to gain escalated privileges.

tags | advisory, denial of service, local, vulnerability
systems | linux, fedora
SHA-256 | 2f1352ce095da4249ed976cd9247e48007d7a1168281135519a02f33dcd5f291

Secunia Security Advisory 28592

Change Mirror Download


----------------------------------------------------------------------

A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.

Download and test it today:
https://psi.secunia.com/

Read more about this new version:
https://psi.secunia.com/?page=changelog

----------------------------------------------------------------------

TITLE:
Fedora update for xorg-x11-server

SECUNIA ADVISORY ID:
SA28592

VERIFY ADVISORY:
http://secunia.com/advisories/28592/

CRITICAL:
Less critical

IMPACT:
Exposure of sensitive information, Privilege escalation, DoS

WHERE:
>From local network

OPERATING SYSTEM:
Fedora 7
http://secunia.com/product/15552/
Fedora 8
http://secunia.com/product/16769/

DESCRIPTION:
Fedora has issued an update for xorg-x11-server. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
cause a DoS (Denial of Service), disclose potentially sensitive
information, or to gain escalated privileges.

For more information:
SA28532

SOLUTION:
Apply updated packages.

-- Fedora 7 --

8f1294fe1c36fe384f60c7590efe1c1028b3cb19
xorg-x11-server-debuginfo-1.3.0.0-15.fc7.ppc64.rpm
44735e3b5dd7ede05b3e4ed63cd8a5c5679fc552
xorg-x11-server-source-1.3.0.0-15.fc7.ppc64.rpm
7b1a4a37dd63230b25ec0d7b9a7c4f8e8843f92a
xorg-x11-server-sdk-1.3.0.0-15.fc7.ppc64.rpm
eeb03ec5f43a0601d1bc01c35001f680b5ceda52
xorg-x11-server-Xephyr-1.3.0.0-15.fc7.ppc64.rpm
f61c11e9007588f509975ec5d88e632e38596052
xorg-x11-server-Xvfb-1.3.0.0-15.fc7.ppc64.rpm
e7fe5867c3a2668af308a3ec434950412636e678
xorg-x11-server-Xdmx-1.3.0.0-15.fc7.ppc64.rpm
d1caf2159a346aba0fdf6bcf573813bdda4b713b
xorg-x11-server-Xnest-1.3.0.0-15.fc7.ppc64.rpm
5de2a29995c550f24f66ad378835487f79bf1500
xorg-x11-server-Xorg-1.3.0.0-15.fc7.ppc64.rpm
d245c3f9b7d863a034a522af1431b87ae6be53ef
xorg-x11-server-Xorg-1.3.0.0-15.fc7.i386.rpm
0f9f08f081379ac6d16591ac3991daf7b987c613
xorg-x11-server-Xvfb-1.3.0.0-15.fc7.i386.rpm
2a715816badf911c80ec6045e8149aa1befad6bc
xorg-x11-server-source-1.3.0.0-15.fc7.i386.rpm
392cace795a2c2fa8f6be6613222fdbc650326d9
xorg-x11-server-sdk-1.3.0.0-15.fc7.i386.rpm
9b91d9a09ca512b7e5270d876d68e319d48178ad
xorg-x11-server-Xephyr-1.3.0.0-15.fc7.i386.rpm
6f865973f9df35b604bd75c5a86851e2e6315380
xorg-x11-server-Xnest-1.3.0.0-15.fc7.i386.rpm
e2a6f4101b8ca05d2f410e9b588dfa933fb36653
xorg-x11-server-Xdmx-1.3.0.0-15.fc7.i386.rpm
e2f6a4709bddb324da689e17d1d126aae3cf9a04
xorg-x11-server-debuginfo-1.3.0.0-15.fc7.i386.rpm
3908e73d35c51d8bdd737eb4c08653cd2b4eb9a3
xorg-x11-server-debuginfo-1.3.0.0-15.fc7.x86_64.rpm
6159ebeaedd9d05ffed2adc013b99bf3ee699ff7
xorg-x11-server-source-1.3.0.0-15.fc7.x86_64.rpm
8096a01f5a215bf006ada1fea134d8da7fa67df8
xorg-x11-server-sdk-1.3.0.0-15.fc7.x86_64.rpm
ed95dcb9975c8f6f3852cb3b5428ca3790d1991e
xorg-x11-server-Xephyr-1.3.0.0-15.fc7.x86_64.rpm
247c1513451f7d49ebcdb9994ece382066d40452
xorg-x11-server-Xvfb-1.3.0.0-15.fc7.x86_64.rpm
1753ba1eff7094b6069157f4b200433422366953
xorg-x11-server-Xdmx-1.3.0.0-15.fc7.x86_64.rpm
ba8fc35fd6b56e0bf5b97249a0863da0f22dc242
xorg-x11-server-Xnest-1.3.0.0-15.fc7.x86_64.rpm
6a4c991637aa807af8d8a2b8fbba2fa27efbbfd2
xorg-x11-server-Xorg-1.3.0.0-15.fc7.x86_64.rpm
8c53e608001616e14236c4ac43067bc82e1380ba
xorg-x11-server-debuginfo-1.3.0.0-15.fc7.ppc.rpm
ec123f22e7c0f50cd040dbe46f2522e05997728d
xorg-x11-server-source-1.3.0.0-15.fc7.ppc.rpm
65f65a9bd81ddeca6702f2d0b7aa3d196a9071b0
xorg-x11-server-sdk-1.3.0.0-15.fc7.ppc.rpm
7c8305257e19620710ad2b5c419b7bfc17d042e9
xorg-x11-server-Xephyr-1.3.0.0-15.fc7.ppc.rpm
78708c683b6e9a9a9616739dca88a6f21e768a0d
xorg-x11-server-Xvfb-1.3.0.0-15.fc7.ppc.rpm
2abd76eecb8964cbbe085fefa9eb0ac6eed2b0e3
xorg-x11-server-Xdmx-1.3.0.0-15.fc7.ppc.rpm
c790261f7b8b28194845e6d7d5d63784b38faf83
xorg-x11-server-Xnest-1.3.0.0-15.fc7.ppc.rpm
4a8fc3959f7d3be2de42813be024510a8385e4fa
xorg-x11-server-Xorg-1.3.0.0-15.fc7.ppc.rpm
242ba11b0566708e054d4e86ae9fa4504a35dcc6
xorg-x11-server-1.3.0.0-15.fc7.src.rpm

-- Fedora 8 --

2ae23ad5b18890ced5849cb1271785805fc12b8c
xorg-x11-server-debuginfo-1.3.0.0-39.fc8.ppc64.rpm
7f89d8bf72a5f33a47e705db0e6f95ea017ea4e4
xorg-x11-server-source-1.3.0.0-39.fc8.ppc64.rpm
640df3574260cfa8794137fc5925d24b9a41081b
xorg-x11-server-sdk-1.3.0.0-39.fc8.ppc64.rpm
69a51257a29e381e4d0ca8de91e6a9269045bbf5
xorg-x11-server-Xephyr-1.3.0.0-39.fc8.ppc64.rpm
032605ed5edc3f6f21794c5578f126926e1ba6c2
xorg-x11-server-Xvfb-1.3.0.0-39.fc8.ppc64.rpm
1c58780d606552ee8819c2f362dad5d5b9ec7525
xorg-x11-server-Xdmx-1.3.0.0-39.fc8.ppc64.rpm
0e09e73c613dfcb1b7924e9c52bae6c6e8b206e3
xorg-x11-server-Xnest-1.3.0.0-39.fc8.ppc64.rpm
f5fe44041fb5333aad05ed06d154279f6cb61a74
xorg-x11-server-Xorg-1.3.0.0-39.fc8.ppc64.rpm
1d9cb03852893e2fef764fa31eadeb3c30f0d64c
xorg-x11-server-debuginfo-1.3.0.0-39.fc8.i386.rpm
05fb6e0a1857efa6ec71ba91131004d9138f1b89
xorg-x11-server-source-1.3.0.0-39.fc8.i386.rpm
8ec188f698034571cef302443861584dea7ecda0
xorg-x11-server-sdk-1.3.0.0-39.fc8.i386.rpm
8f56254c892f2d42e2fc2e218f77b97c7001c88e
xorg-x11-server-Xephyr-1.3.0.0-39.fc8.i386.rpm
c78fd8a597d6ebfa10e699632337e4d9c97fe0fb
xorg-x11-server-Xvfb-1.3.0.0-39.fc8.i386.rpm
51d6cd2856319d0ff61bb60dc675583ff5a066ce
xorg-x11-server-Xdmx-1.3.0.0-39.fc8.i386.rpm
ff263c0321b2292e0955547bb843937e29a3f945
xorg-x11-server-Xnest-1.3.0.0-39.fc8.i386.rpm
6e33d9def70f8dad2bb90410af42770d85e32061
xorg-x11-server-Xorg-1.3.0.0-39.fc8.i386.rpm
57ea21be7a52de46b3d1b3739d60db82c317ac5b
xorg-x11-server-Xvfb-1.3.0.0-39.fc8.x86_64.rpm
25032e831096c9bed9fcf88dde0d006ac3a4acb5
xorg-x11-server-Xnest-1.3.0.0-39.fc8.x86_64.rpm
cefc3a0ea1f69fc80f7cc60e3da517ec475a3ad0
xorg-x11-server-debuginfo-1.3.0.0-39.fc8.x86_64.rpm
4a931017170608fe9015b40bbf3d94c726135a5b
xorg-x11-server-Xorg-1.3.0.0-39.fc8.x86_64.rpm
b845a1ad9b96f2352930ead6504535d4a1374af7
xorg-x11-server-source-1.3.0.0-39.fc8.x86_64.rpm
2d24636a924e72c9d5e4ec246562faea764c7cdf
xorg-x11-server-Xdmx-1.3.0.0-39.fc8.x86_64.rpm
34d830c59e6ca133a9ab224f0fdb73a1a164c7f8
xorg-x11-server-sdk-1.3.0.0-39.fc8.x86_64.rpm
e338255563d060ef786c894057e5e682e56f4661
xorg-x11-server-Xephyr-1.3.0.0-39.fc8.x86_64.rpm
006c1918a8f152f7e182b3cd2a2b88a311c1ab42
xorg-x11-server-debuginfo-1.3.0.0-39.fc8.ppc.rpm
eb9e52c296bfc649468f9836efe965e7a3bbfaef
xorg-x11-server-source-1.3.0.0-39.fc8.ppc.rpm
5aedf46ac6d41b77f0b2a1da03cd355215e6e354
xorg-x11-server-sdk-1.3.0.0-39.fc8.ppc.rpm
e3c61b92393597c76ea1849b028b769b91c7c93a
xorg-x11-server-Xephyr-1.3.0.0-39.fc8.ppc.rpm
2d5c19d937549f38e044e290d5fcbce458058a03
xorg-x11-server-Xvfb-1.3.0.0-39.fc8.ppc.rpm
55081bb5cab63088a1e6cc7d43b031b4b1e1ee0f
xorg-x11-server-Xdmx-1.3.0.0-39.fc8.ppc.rpm
ef1c093c2fd1435ae44a92bbcbe8ed88fe11df1b
xorg-x11-server-Xnest-1.3.0.0-39.fc8.ppc.rpm
f7f9e0c881028509352241b4e2d3a849cfbc5b9a
xorg-x11-server-Xorg-1.3.0.0-39.fc8.ppc.rpm
51da9519311ee5b83fa9c98b027710a1dcafaadf
xorg-x11-server-1.3.0.0-39.fc8.src.rpm

ORIGINAL ADVISORY:
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00704.html
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00641.html

OTHER REFERENCES:
SA28532:
http://secunia.com/advisories/28532/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close