exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2010-095

Mandriva Linux Security Advisory 2010-095
Posted May 14, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-095 - There's a race condition in libXext that causes apps that use the X shared memory extensions to occasionally crash. Packages for 2008.0 and 2009.0 are provided due to the Extended Maintenance Program for those products. The corrected packages solves this problem.

tags | advisory
systems | linux, mandriva
SHA-256 | acdafbf22f6b911420511e7f7e66000b4f1f998ac233fc90b0ef1418b63ddf73

Mandriva Linux Security Advisory 2010-095

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2010:095
http://www.mandriva.com/security/
_______________________________________________________________________

Package : libxext
Date : May 12, 2010
Affected: 2008.0, 2009.0, 2009.1, 2010.0
_______________________________________________________________________

Problem Description:

A vulnerability has been discovered and fixed in libxext:

There's a race condition in libXext that causes apps that use the X
shared memory extensions to occasionally crash.

Packages for 2008.0 and 2009.0 are provided due to the Extended
Maintenance Program for those products.

The corrected packages solves this problem.
_______________________________________________________________________

References:

http://lists.freedesktop.org/archives/xcb/2009-October/005102.html
http://crbug.com/25324
http://cgit.freedesktop.org/xorg/lib/libXext/commit/?id=956fd30e1046e5779ac0b6c07ec4f0e87250869a
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2008.0:
ad8fd95b87fc8b9a6fb343c47db9506c 2008.0/i586/libxext6-1.0.3-1.1mdv2008.0.i586.rpm
f20b40d2eb46373e67f15687adff3db1 2008.0/i586/libxext6-devel-1.0.3-1.1mdv2008.0.i586.rpm
290699cbb64a52a25557d09bb41bf244 2008.0/i586/libxext6-static-devel-1.0.3-1.1mdv2008.0.i586.rpm
2b51d891924056f31602439a9fe678d5 2008.0/SRPMS/libxext-1.0.3-1.1mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
d53d3e82879543b33a207bdc557a0132 2008.0/x86_64/lib64xext6-1.0.3-1.1mdv2008.0.x86_64.rpm
8b8848e41fb2230efc2bd31f7949eab3 2008.0/x86_64/lib64xext6-devel-1.0.3-1.1mdv2008.0.x86_64.rpm
27fb66d245b0cbf720c69f46fe88c538 2008.0/x86_64/lib64xext6-static-devel-1.0.3-1.1mdv2008.0.x86_64.rpm
2b51d891924056f31602439a9fe678d5 2008.0/SRPMS/libxext-1.0.3-1.1mdv2008.0.src.rpm

Mandriva Linux 2009.0:
4e787ff5e464f9c5b49d9af191763bd6 2009.0/i586/libxext6-1.0.4-2.1mdv2009.0.i586.rpm
f3c193f8524069269db78a48015af7d3 2009.0/i586/libxext6-devel-1.0.4-2.1mdv2009.0.i586.rpm
9df3da9e5c5521e042c57ed09253893a 2009.0/i586/libxext6-static-devel-1.0.4-2.1mdv2009.0.i586.rpm
e9970b9bd08d5c9ecd662a85dd6c4371 2009.0/SRPMS/libxext-1.0.4-2.1mdv2009.0.src.rpm

Mandriva Linux 2009.0/X86_64:
a23579189108c72f49cbe76a20971137 2009.0/x86_64/lib64xext6-1.0.4-2.1mdv2009.0.x86_64.rpm
77edbaa536b888f34dbbd1d8a88d9f19 2009.0/x86_64/lib64xext6-devel-1.0.4-2.1mdv2009.0.x86_64.rpm
8bb522eca226fa6309304c823b380650 2009.0/x86_64/lib64xext6-static-devel-1.0.4-2.1mdv2009.0.x86_64.rpm
e9970b9bd08d5c9ecd662a85dd6c4371 2009.0/SRPMS/libxext-1.0.4-2.1mdv2009.0.src.rpm

Mandriva Linux 2009.1:
9ff7e42573e3150a71422a4850075bc8 2009.1/i586/libxext6-1.0.5-2.1mdv2009.1.i586.rpm
39b8b9956410e9331420ae1151ec03e1 2009.1/i586/libxext6-devel-1.0.5-2.1mdv2009.1.i586.rpm
10ab96b84c8fbb4b3b4ac25cc4d2c3f8 2009.1/i586/libxext6-static-devel-1.0.5-2.1mdv2009.1.i586.rpm
0176ab4c8af885d79e681fede1065f46 2009.1/SRPMS/libxext-1.0.5-2.1mdv2009.1.src.rpm

Mandriva Linux 2009.1/X86_64:
eeef3de59cb0f165da7743ad1308a211 2009.1/x86_64/lib64xext6-1.0.5-2.1mdv2009.1.x86_64.rpm
dbbb84959627b84f74b101ec8104c11c 2009.1/x86_64/lib64xext6-devel-1.0.5-2.1mdv2009.1.x86_64.rpm
7e7dabaf366ef5b8b4f3001f13a72ce6 2009.1/x86_64/lib64xext6-static-devel-1.0.5-2.1mdv2009.1.x86_64.rpm
0176ab4c8af885d79e681fede1065f46 2009.1/SRPMS/libxext-1.0.5-2.1mdv2009.1.src.rpm

Mandriva Linux 2010.0:
6e04840f5af1408570332de3398baa9e 2010.0/i586/libxext6-1.0.5-1.2mdv2010.0.i586.rpm
3481fee943a662442907d3e27895045f 2010.0/i586/libxext6-devel-1.0.5-1.2mdv2010.0.i586.rpm
0f3fae7db2f4193f18ee02acc825f6cd 2010.0/i586/libxext6-static-devel-1.0.5-1.2mdv2010.0.i586.rpm
4925a2ab4e28ce29c6a0dc91eb002325 2010.0/SRPMS/libxext-1.0.5-1.2mdv2010.0.src.rpm

Mandriva Linux 2010.0/X86_64:
3829d3ce2d9489b2a5e4c20438e76e27 2010.0/x86_64/lib64xext6-1.0.5-1.2mdv2010.0.x86_64.rpm
8415205e2961c8826084c9151f2a0a1a 2010.0/x86_64/lib64xext6-devel-1.0.5-1.2mdv2010.0.x86_64.rpm
45444c657ff3007d2275417b33a591dc 2010.0/x86_64/lib64xext6-static-devel-1.0.5-1.2mdv2010.0.x86_64.rpm
4925a2ab4e28ce29c6a0dc91eb002325 2010.0/SRPMS/libxext-1.0.5-1.2mdv2010.0.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFL6xO5mqjQ0CJFipgRAuKgAJ9cTATrxceCPa5RdZF4QxrY02YS9QCgzbQf
LR9v7AgXgqOfgQFxWwwW77k=
=6boW
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close