---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: Mandriva update for x11-server SECUNIA ADVISORY ID: SA28584 VERIFY ADVISORY: http://secunia.com/advisories/28584/ CRITICAL: Less critical IMPACT: Exposure of sensitive information, Privilege escalation, DoS WHERE: Local system OPERATING SYSTEM: Mandriva Linux 2007 http://secunia.com/product/12165/ DESCRIPTION: Mandriva has issued an update for x11-server. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, or to gain escalated privileges. For more information: SA28532 SOLUTION: Apply updated packages. Mandriva Linux 2007 536b2b843db365fa759ebcce5aadf8fa 2007.0/i586/x11-server-1.1.1-12.3mdv2007.0.i586.rpm 4e5e7b280242217f8168f9b47ff8781a 2007.0/i586/x11-server-common-1.1.1-12.3mdv2007.0.i586.rpm cb1487dd1eceb45aa03b9a0aa77a293c 2007.0/i586/x11-server-devel-1.1.1-12.3mdv2007.0.i586.rpm 2c319a8ae154d1645656dd4a7f1fe239 2007.0/i586/x11-server-xati-1.1.1-12.3mdv2007.0.i586.rpm 079f895ff1d5e2f48aaa556bd7a59519 2007.0/i586/x11-server-xchips-1.1.1-12.3mdv2007.0.i586.rpm 54e005629b2f4b56f2b01dc5a6769b45 2007.0/i586/x11-server-xdmx-1.1.1-12.3mdv2007.0.i586.rpm 582b3f8eaabc14a13c652c9541db5a3a 2007.0/i586/x11-server-xephyr-1.1.1-12.3mdv2007.0.i586.rpm 382083d039b8fb981fdef2d3f2952e5d 2007.0/i586/x11-server-xepson-1.1.1-12.3mdv2007.0.i586.rpm 2cd603401aa8507c79a45a377a5dc5a5 2007.0/i586/x11-server-xfake-1.1.1-12.3mdv2007.0.i586.rpm 4dd7e8fb8b15ac5ae913a770e3dc0edd 2007.0/i586/x11-server-xfbdev-1.1.1-12.3mdv2007.0.i586.rpm f233d76be20f906e0447a13142e92bda 2007.0/i586/x11-server-xi810-1.1.1-12.3mdv2007.0.i586.rpm 6d54b4cdb68a27648ea045ecaa7e2e93 2007.0/i586/x11-server-xmach64-1.1.1-12.3mdv2007.0.i586.rpm a205af74dace2a90e0bf7ab595cae4a5 2007.0/i586/x11-server-xmga-1.1.1-12.3mdv2007.0.i586.rpm 99ed4f80e419c9eced26083d27b04dcb 2007.0/i586/x11-server-xneomagic-1.1.1-12.3mdv2007.0.i586.rpm 8cc833f4c1ea7853f4269182ee8c8662 2007.0/i586/x11-server-xnest-1.1.1-12.3mdv2007.0.i586.rpm 0cec70b4e20ffc9ef6da1b277b00a4dc 2007.0/i586/x11-server-xnvidia-1.1.1-12.3mdv2007.0.i586.rpm a0a7a471c0223fe3a961f602b36b5c3c 2007.0/i586/x11-server-xorg-1.1.1-12.3mdv2007.0.i586.rpm 5d1784f3afcb6f056da1524191d79e7d 2007.0/i586/x11-server-xpm2-1.1.1-12.3mdv2007.0.i586.rpm ef2a81299e26c3da215f6d1150da75ef 2007.0/i586/x11-server-xprt-1.1.1-12.3mdv2007.0.i586.rpm 8ffbdfbd4fd6d98d88956fbbd1b4547d 2007.0/i586/x11-server-xr128-1.1.1-12.3mdv2007.0.i586.rpm b847cccad2ee87d6a81e73a450d4be1e 2007.0/i586/x11-server-xsdl-1.1.1-12.3mdv2007.0.i586.rpm 820cb3af32609084de5af13dae86658a 2007.0/i586/x11-server-xsmi-1.1.1-12.3mdv2007.0.i586.rpm 7386f22db489688076d2a683a2275b16 2007.0/i586/x11-server-xvesa-1.1.1-12.3mdv2007.0.i586.rpm 1be8682ca9f2b5ea024e851015779a6f 2007.0/i586/x11-server-xvfb-1.1.1-12.3mdv2007.0.i586.rpm 4078f13ac77324a07439f964d86c5878 2007.0/i586/x11-server-xvia-1.1.1-12.3mdv2007.0.i586.rpm 0cb8cf686f9af1d660e2bdb52e291c59 2007.0/SRPMS/x11-server-1.1.1-12.3mdv2007.0.src.rpm Mandriva Linux 2007/X86_64 bf838b3ef7c3e8e8684c51511a705de3 2007.0/x86_64/x11-server-1.1.1-12.3mdv2007.0.x86_64.rpm 969a80b0fd6e55fec6548392bcebb9c6 2007.0/x86_64/x11-server-common-1.1.1-12.3mdv2007.0.x86_64.rpm c629fdc6b3437d105296245b5f2b714d 2007.0/x86_64/x11-server-devel-1.1.1-12.3mdv2007.0.x86_64.rpm 4656a0128755192b4dd385a61d47c79f 2007.0/x86_64/x11-server-xdmx-1.1.1-12.3mdv2007.0.x86_64.rpm 95074952395ca22438f36095fd1b8b89 2007.0/x86_64/x11-server-xephyr-1.1.1-12.3mdv2007.0.x86_64.rpm beeff525e9266eb9868c8d8678c73c15 2007.0/x86_64/x11-server-xfake-1.1.1-12.3mdv2007.0.x86_64.rpm 1de55a43f5ddbee1915da4f4168081e6 2007.0/x86_64/x11-server-xfbdev-1.1.1-12.3mdv2007.0.x86_64.rpm e641780613f609debbb6bf8a3ccffb70 2007.0/x86_64/x11-server-xnest-1.1.1-12.3mdv2007.0.x86_64.rpm b5e65fb9bd6e8269be240b81a341bd05 2007.0/x86_64/x11-server-xorg-1.1.1-12.3mdv2007.0.x86_64.rpm 83a7254129bd392490b51ce15262a3cc 2007.0/x86_64/x11-server-xprt-1.1.1-12.3mdv2007.0.x86_64.rpm 8195afdcaf12dafe279a3d2c59494e97 2007.0/x86_64/x11-server-xsdl-1.1.1-12.3mdv2007.0.x86_64.rpm 4cfe6e309d62fc1b11b335f8b14b4eb0 2007.0/x86_64/x11-server-xvfb-1.1.1-12.3mdv2007.0.x86_64.rpm 0cb8cf686f9af1d660e2bdb52e291c59 2007.0/SRPMS/x11-server-1.1.1-12.3mdv2007.0.src.rpm ORIGINAL ADVISORY: http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:023 OTHER REFERENCES: SA28532: http://secunia.com/advisories/28532/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------