Secunia Security Advisory - Mandriva has issued an update for x11-server. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, or to gain escalated privileges.
d4492bb3a8c57468dfb513f8a3fd6f291fb4662efcd3309ffd6418ae3bdef7ba
----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
Download and test it today:
https://psi.secunia.com/
Read more about this new version:
https://psi.secunia.com/?page=changelog
----------------------------------------------------------------------
TITLE:
Mandriva update for x11-server
SECUNIA ADVISORY ID:
SA28584
VERIFY ADVISORY:
http://secunia.com/advisories/28584/
CRITICAL:
Less critical
IMPACT:
Exposure of sensitive information, Privilege escalation, DoS
WHERE:
Local system
OPERATING SYSTEM:
Mandriva Linux 2007
http://secunia.com/product/12165/
DESCRIPTION:
Mandriva has issued an update for x11-server. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
cause a DoS (Denial of Service), disclose potentially sensitive
information, or to gain escalated privileges.
For more information:
SA28532
SOLUTION:
Apply updated packages.
Mandriva Linux 2007
536b2b843db365fa759ebcce5aadf8fa
2007.0/i586/x11-server-1.1.1-12.3mdv2007.0.i586.rpm
4e5e7b280242217f8168f9b47ff8781a
2007.0/i586/x11-server-common-1.1.1-12.3mdv2007.0.i586.rpm
cb1487dd1eceb45aa03b9a0aa77a293c
2007.0/i586/x11-server-devel-1.1.1-12.3mdv2007.0.i586.rpm
2c319a8ae154d1645656dd4a7f1fe239
2007.0/i586/x11-server-xati-1.1.1-12.3mdv2007.0.i586.rpm
079f895ff1d5e2f48aaa556bd7a59519
2007.0/i586/x11-server-xchips-1.1.1-12.3mdv2007.0.i586.rpm
54e005629b2f4b56f2b01dc5a6769b45
2007.0/i586/x11-server-xdmx-1.1.1-12.3mdv2007.0.i586.rpm
582b3f8eaabc14a13c652c9541db5a3a
2007.0/i586/x11-server-xephyr-1.1.1-12.3mdv2007.0.i586.rpm
382083d039b8fb981fdef2d3f2952e5d
2007.0/i586/x11-server-xepson-1.1.1-12.3mdv2007.0.i586.rpm
2cd603401aa8507c79a45a377a5dc5a5
2007.0/i586/x11-server-xfake-1.1.1-12.3mdv2007.0.i586.rpm
4dd7e8fb8b15ac5ae913a770e3dc0edd
2007.0/i586/x11-server-xfbdev-1.1.1-12.3mdv2007.0.i586.rpm
f233d76be20f906e0447a13142e92bda
2007.0/i586/x11-server-xi810-1.1.1-12.3mdv2007.0.i586.rpm
6d54b4cdb68a27648ea045ecaa7e2e93
2007.0/i586/x11-server-xmach64-1.1.1-12.3mdv2007.0.i586.rpm
a205af74dace2a90e0bf7ab595cae4a5
2007.0/i586/x11-server-xmga-1.1.1-12.3mdv2007.0.i586.rpm
99ed4f80e419c9eced26083d27b04dcb
2007.0/i586/x11-server-xneomagic-1.1.1-12.3mdv2007.0.i586.rpm
8cc833f4c1ea7853f4269182ee8c8662
2007.0/i586/x11-server-xnest-1.1.1-12.3mdv2007.0.i586.rpm
0cec70b4e20ffc9ef6da1b277b00a4dc
2007.0/i586/x11-server-xnvidia-1.1.1-12.3mdv2007.0.i586.rpm
a0a7a471c0223fe3a961f602b36b5c3c
2007.0/i586/x11-server-xorg-1.1.1-12.3mdv2007.0.i586.rpm
5d1784f3afcb6f056da1524191d79e7d
2007.0/i586/x11-server-xpm2-1.1.1-12.3mdv2007.0.i586.rpm
ef2a81299e26c3da215f6d1150da75ef
2007.0/i586/x11-server-xprt-1.1.1-12.3mdv2007.0.i586.rpm
8ffbdfbd4fd6d98d88956fbbd1b4547d
2007.0/i586/x11-server-xr128-1.1.1-12.3mdv2007.0.i586.rpm
b847cccad2ee87d6a81e73a450d4be1e
2007.0/i586/x11-server-xsdl-1.1.1-12.3mdv2007.0.i586.rpm
820cb3af32609084de5af13dae86658a
2007.0/i586/x11-server-xsmi-1.1.1-12.3mdv2007.0.i586.rpm
7386f22db489688076d2a683a2275b16
2007.0/i586/x11-server-xvesa-1.1.1-12.3mdv2007.0.i586.rpm
1be8682ca9f2b5ea024e851015779a6f
2007.0/i586/x11-server-xvfb-1.1.1-12.3mdv2007.0.i586.rpm
4078f13ac77324a07439f964d86c5878
2007.0/i586/x11-server-xvia-1.1.1-12.3mdv2007.0.i586.rpm
0cb8cf686f9af1d660e2bdb52e291c59
2007.0/SRPMS/x11-server-1.1.1-12.3mdv2007.0.src.rpm
Mandriva Linux 2007/X86_64
bf838b3ef7c3e8e8684c51511a705de3
2007.0/x86_64/x11-server-1.1.1-12.3mdv2007.0.x86_64.rpm
969a80b0fd6e55fec6548392bcebb9c6
2007.0/x86_64/x11-server-common-1.1.1-12.3mdv2007.0.x86_64.rpm
c629fdc6b3437d105296245b5f2b714d
2007.0/x86_64/x11-server-devel-1.1.1-12.3mdv2007.0.x86_64.rpm
4656a0128755192b4dd385a61d47c79f
2007.0/x86_64/x11-server-xdmx-1.1.1-12.3mdv2007.0.x86_64.rpm
95074952395ca22438f36095fd1b8b89
2007.0/x86_64/x11-server-xephyr-1.1.1-12.3mdv2007.0.x86_64.rpm
beeff525e9266eb9868c8d8678c73c15
2007.0/x86_64/x11-server-xfake-1.1.1-12.3mdv2007.0.x86_64.rpm
1de55a43f5ddbee1915da4f4168081e6
2007.0/x86_64/x11-server-xfbdev-1.1.1-12.3mdv2007.0.x86_64.rpm
e641780613f609debbb6bf8a3ccffb70
2007.0/x86_64/x11-server-xnest-1.1.1-12.3mdv2007.0.x86_64.rpm
b5e65fb9bd6e8269be240b81a341bd05
2007.0/x86_64/x11-server-xorg-1.1.1-12.3mdv2007.0.x86_64.rpm
83a7254129bd392490b51ce15262a3cc
2007.0/x86_64/x11-server-xprt-1.1.1-12.3mdv2007.0.x86_64.rpm
8195afdcaf12dafe279a3d2c59494e97
2007.0/x86_64/x11-server-xsdl-1.1.1-12.3mdv2007.0.x86_64.rpm
4cfe6e309d62fc1b11b335f8b14b4eb0
2007.0/x86_64/x11-server-xvfb-1.1.1-12.3mdv2007.0.x86_64.rpm
0cb8cf686f9af1d660e2bdb52e291c59
2007.0/SRPMS/x11-server-1.1.1-12.3mdv2007.0.src.rpm
ORIGINAL ADVISORY:
http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:023
OTHER REFERENCES:
SA28532:
http://secunia.com/advisories/28532/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------