---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: Fedora update for libXfont SECUNIA ADVISORY ID: SA28500 VERIFY ADVISORY: http://secunia.com/advisories/28500/ CRITICAL: Less critical IMPACT: Privilege escalation WHERE: Local system OPERATING SYSTEM: Fedora 7 http://secunia.com/product/15552/ Fedora 8 http://secunia.com/product/16769/ DESCRIPTION: Fedora has issued an update for libXfont. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. For more information: SA28532 SOLUTION: Apply updated packages. -- Fedora 7 -- 1abee4f6382d77b18380b62bc93d6ebcf9ff3d5b libXfont-debuginfo-1.2.9-3.fc7.ppc64.rpm 26064c202e1f72378dddffa2d67379b0798812c8 libXfont-devel-1.2.9-3.fc7.ppc64.rpm 80d0e6d684fad97bb7fa9c7ac3fd6696414fed41 libXfont-1.2.9-3.fc7.ppc64.rpm 397ede7646d407f7ad378191e81ff041b104fe4e libXfont-debuginfo-1.2.9-3.fc7.i386.rpm 71b600559094d736eda79478724f727b79de72de libXfont-devel-1.2.9-3.fc7.i386.rpm d549935e282061059ed038c447b119e4c797c0e6 libXfont-1.2.9-3.fc7.i386.rpm 4be18dadb722d2e5f90dd3b1104f749292cc9162 libXfont-debuginfo-1.2.9-3.fc7.x86_64.rpm c108759b4f2d560ed2efff16beb551d0790c74b7 libXfont-1.2.9-3.fc7.x86_64.rpm 5bccd560713d698e4478b91dc35b320f488eb22b libXfont-devel-1.2.9-3.fc7.x86_64.rpm 0a9ba458464bd1ea7ede5e4ecf796dd48769c174 libXfont-debuginfo-1.2.9-3.fc7.ppc.rpm 9034776dfb6309621435809aa1f3a15fdbb6c290 libXfont-devel-1.2.9-3.fc7.ppc.rpm 7f715606185271404684d5e0edee5514f03829f5 libXfont-1.2.9-3.fc7.ppc.rpm 225367431ad0b28e673b187773c5c32073b929f8 libXfont-1.2.9-3.fc7.src.rpm -- Fedora 8 -- 90ddbe53973110318f542b58f0c5129eac810f70 libXfont-debuginfo-1.3.1-2.fc8.ppc64.rpm 5522e05e6b677bd3f39a03a819a831ec8cbcdeb5 libXfont-devel-1.3.1-2.fc8.ppc64.rpm a1d73ad828b14abda0db3b48d3ceb7ef735b8e5f libXfont-1.3.1-2.fc8.ppc64.rpm e38ec3ab2d62b6dd83fb75ffd709401768192409 libXfont-debuginfo-1.3.1-2.fc8.i386.rpm b3542ffe428cc16c0c806b0aa3fb8680d14f0587 libXfont-devel-1.3.1-2.fc8.i386.rpm e5deb9de3bc594b48ba5f22b9a4c557376e1fd17 libXfont-1.3.1-2.fc8.i386.rpm b2fe10c4bee6f4cc6b8801ad59279f97510dd1f1 libXfont-debuginfo-1.3.1-2.fc8.x86_64.rpm 95e1c4408daf5c8444d61972e33e103256b75da5 libXfont-devel-1.3.1-2.fc8.x86_64.rpm 725bd5b66b52683e84c5f3412482f8ba6d1415f2 libXfont-1.3.1-2.fc8.x86_64.rpm 815ca48769898279b889cbaa9c803a299a9ec6dc libXfont-debuginfo-1.3.1-2.fc8.ppc.rpm 7cdc60e0c429da43091940a913a87e749a69f4d8 libXfont-devel-1.3.1-2.fc8.ppc.rpm 81c55ea1af85d268527f03dc10c01a98c9524ac4 libXfont-1.3.1-2.fc8.ppc.rpm 0f39a0a56c630212e75ce93373e0cf61925bd7a3 libXfont-1.3.1-2.fc8.src.rpm ORIGINAL ADVISORY: https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00771.html https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00674.html OTHER REFERENCES: SA28532: http://secunia.com/advisories/28532/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------