-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2008:022 http://www.mandriva.com/security/ _______________________________________________________________________ Package : xorg-x11 Date : January 23, 2008 Affected: Corporate 4.0 _______________________________________________________________________ Problem Description: Aaron Plattner discovered a buffer overflow in the Composite extension of the X.org X server, which if exploited could lead to local privilege escalation (CVE-2007-4730). An input validation flaw was found in the X.org server's XFree86-Misc extension that could allow a malicious authorized client to cause a denial of service (crash), or potentially execute arbitrary code with root privileges on the X.org server (CVE-2007-5760). A flaw was found in the X.org server's XC-SECURITY extension that could allow a local user to verify the existence of an arbitrary file, even in directories that are not normally accessible to that user (CVE-2007-5958). A memory corruption flaw was found in the X.org server's XInput extension that could allow a malicious authorized client to cause a denial of service (crash) or potentially execute arbitrary code with root privileges on the X.org server (CVE-2007-6427). An information disclosure flaw was found in the X.org server's TOG-CUP extension that could allow a malicious authorized client to cause a denial of service (crash) or potentially view arbitrary memory content within the X.org server's address space (CVE-2007-6428). Two integer overflow flaws were found in the X.org server's EVI and MIT-SHM modules that could allow a malicious authorized client to cause a denial of service (crash) or potentially execute arbitrary code with the privileges of the X.org server (CVE-2007-6429). A heap-based buffer overflow flaw was found in how the X.org server handled malformed font files that could allow a malicious local user to potentially execute arbitrary code with the privileges of the X.org server (CVE-2008-0006). The updated packages have been patched to correct these issues. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4730 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5760 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5958 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6427 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6428 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6429 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0006 _______________________________________________________________________ Updated Packages: Corporate 4.0: 745259cf5b88b71fc3bd7789f499d5fa corporate/4.0/i586/X11R6-contrib-6.9.0-5.17.20060mlcs4.i586.rpm 52427cf3c1baca4faeb5b0270486afb1 corporate/4.0/i586/libxorg-x11-6.9.0-5.17.20060mlcs4.i586.rpm 0104d49fd4dc17d675e97bd78c39dcb7 corporate/4.0/i586/libxorg-x11-devel-6.9.0-5.17.20060mlcs4.i586.rpm 0a4a5623e79a93dc8c9cf149f8802df5 corporate/4.0/i586/libxorg-x11-static-devel-6.9.0-5.17.20060mlcs4.i586.rpm 7a1a346cbeaccf5529c9369834b9c141 corporate/4.0/i586/xorg-x11-100dpi-fonts-6.9.0-5.17.20060mlcs4.i586.rpm 8b08ddcbcb9d2e44e113dabbcaa31f3f corporate/4.0/i586/xorg-x11-6.9.0-5.17.20060mlcs4.i586.rpm f9d8d3489804385eeea25f14d431ac6c corporate/4.0/i586/xorg-x11-75dpi-fonts-6.9.0-5.17.20060mlcs4.i586.rpm 664c44d87d9aac5923b6ba23c9415a93 corporate/4.0/i586/xorg-x11-Xdmx-6.9.0-5.17.20060mlcs4.i586.rpm b987adc63236649ab473d1613a610b59 corporate/4.0/i586/xorg-x11-Xnest-6.9.0-5.17.20060mlcs4.i586.rpm 1640c9b1f6d92092982ca24d41c3c2cc corporate/4.0/i586/xorg-x11-Xprt-6.9.0-5.17.20060mlcs4.i586.rpm 2c327bbfa16512a74ea1e6497312a474 corporate/4.0/i586/xorg-x11-Xvfb-6.9.0-5.17.20060mlcs4.i586.rpm bb338bd4893fa9ec954bfdaee111e8fa corporate/4.0/i586/xorg-x11-cyrillic-fonts-6.9.0-5.17.20060mlcs4.i586.rpm 226b8d73d9f4752ca96b0af4d8d2dc8c corporate/4.0/i586/xorg-x11-doc-6.9.0-5.17.20060mlcs4.i586.rpm fbc643b4ddff57a15259ebdcee83ae3b corporate/4.0/i586/xorg-x11-glide-module-6.9.0-5.17.20060mlcs4.i586.rpm d094dff242abe72e8629587f407e5372 corporate/4.0/i586/xorg-x11-server-6.9.0-5.17.20060mlcs4.i586.rpm cadc6217f3231657004c33a0e4ee8176 corporate/4.0/i586/xorg-x11-xauth-6.9.0-5.17.20060mlcs4.i586.rpm 090cbdc2ffb0c87e633877a082f618d2 corporate/4.0/i586/xorg-x11-xfs-6.9.0-5.17.20060mlcs4.i586.rpm 6fe68d18ca8573fa8f8ef54044f04bd9 corporate/4.0/SRPMS/xorg-x11-6.9.0-5.17.20060mlcs4.src.rpm Corporate 4.0/X86_64: aa9933a623aacfb3ef98af60bdf02978 corporate/4.0/x86_64/X11R6-contrib-6.9.0-5.17.20060mlcs4.x86_64.rpm c16ee8baaa17ae5559abdf05a68b29b7 corporate/4.0/x86_64/lib64xorg-x11-6.9.0-5.17.20060mlcs4.x86_64.rpm dbb91844486b5d2810179df77c79d9cb corporate/4.0/x86_64/lib64xorg-x11-devel-6.9.0-5.17.20060mlcs4.x86_64.rpm c9ef3ba366265a7a98dc7702783d8e0b corporate/4.0/x86_64/lib64xorg-x11-static-devel-6.9.0-5.17.20060mlcs4.x86_64.rpm d13fe9fc2cff5b2586150a90ec5007e0 corporate/4.0/x86_64/xorg-x11-100dpi-fonts-6.9.0-5.17.20060mlcs4.x86_64.rpm 0b7271ca041dfaffcfc80accb94147e2 corporate/4.0/x86_64/xorg-x11-6.9.0-5.17.20060mlcs4.x86_64.rpm 19bb3f9eb4b3de572c392502b7fc85b4 corporate/4.0/x86_64/xorg-x11-75dpi-fonts-6.9.0-5.17.20060mlcs4.x86_64.rpm b4f05761ce514904d2ca9a4f2d2b0c78 corporate/4.0/x86_64/xorg-x11-Xdmx-6.9.0-5.17.20060mlcs4.x86_64.rpm eb0dbdf467755e2e97812e08b5aaa9f4 corporate/4.0/x86_64/xorg-x11-Xnest-6.9.0-5.17.20060mlcs4.x86_64.rpm 7d6eb9f8fe531fbbbd4103aa7372f20a corporate/4.0/x86_64/xorg-x11-Xprt-6.9.0-5.17.20060mlcs4.x86_64.rpm bc662a72716be2960e8dcc753f6d6000 corporate/4.0/x86_64/xorg-x11-Xvfb-6.9.0-5.17.20060mlcs4.x86_64.rpm 93f41ba4dadacc7b52e19e6be7bc2e03 corporate/4.0/x86_64/xorg-x11-cyrillic-fonts-6.9.0-5.17.20060mlcs4.x86_64.rpm 6a4a81a0b5636fabb82076fdf8af77f1 corporate/4.0/x86_64/xorg-x11-doc-6.9.0-5.17.20060mlcs4.x86_64.rpm eccbe735c36fa828af2f847e57179654 corporate/4.0/x86_64/xorg-x11-glide-module-6.9.0-5.17.20060mlcs4.x86_64.rpm d9a11280a9c4708247bfd57020f8aa72 corporate/4.0/x86_64/xorg-x11-server-6.9.0-5.17.20060mlcs4.x86_64.rpm 09494026941f6d0c0b1ed762e4a8fa82 corporate/4.0/x86_64/xorg-x11-xauth-6.9.0-5.17.20060mlcs4.x86_64.rpm 13e12eff1eda79197b9461be4104b37a corporate/4.0/x86_64/xorg-x11-xfs-6.9.0-5.17.20060mlcs4.x86_64.rpm 6fe68d18ca8573fa8f8ef54044f04bd9 corporate/4.0/SRPMS/xorg-x11-6.9.0-5.17.20060mlcs4.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.8 (GNU/Linux) iD8DBQFHl+cUmqjQ0CJFipgRAt2+AJ46HGoUD5fieNnq20tCGRwfR+fMewCg0TZE 2Cc7L7FbXYig5XK0jVtdGdQ= =dX6E -----END PGP SIGNATURE-----