lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-id: <E1JI2LU-0007dM-BV@artemis.annvix.ca>
Date: Thu, 24 Jan 2008 06:42:20 -0700
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2008:021 ] - Updated XFree86 packages fix multiple
 vulnerabilities


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDVSA-2008:021
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : XFree86
 Date    : January 23, 2008
 Affected: Corporate 3.0
 _______________________________________________________________________
 
 Problem Description:
 
 A flaw was found in the XFree86 server's XC-SECURITY extension that
 could allow a local user to verify the existence of an arbitrary file,
 even in directories that are not normally accessible to that user
 (CVE-2007-5958).
 
 A memory corruption flaw was found in the XFree86 server's XInput
 extension that could allow a malicious authorized client to cause a
 denial of service (crash) or potentially execute arbitrary code with
 root privileges on the XFree86 server (CVE-2007-6427).
 
 An information disclosure flaw was found in the XFree86 server's
 TOG-CUP extension that could allow a malicious authorized client to
 cause a denial of service (crash) or potentially view arbitrary memory
 content within the XFree86 server's address space (CVE-2007-6428).
 
 Two integer overflow flaws were found in the XFree86 server's EVI
 and MIT-SHM modules that could allow a malicious authorized client
 to cause a denial of service (crash) or potentially execute arbitrary
 code with the privileges of the XFree86 server (CVE-2007-6429).
 
 A heap-based buffer overflow flaw was found in how the XFree86 server
 handled malformed font files that could allow a malicious local user
 to potentially execute arbitrary code with the privileges of the
 XFree86 server (CVE-2008-0006).
 
 The updated packages have been patched to correct these issues.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5958
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6427
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6428
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6429
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0006
 _______________________________________________________________________
 
 Updated Packages:
 
 Corporate 3.0:
 edf0b59930673873fb08cccc9be6455d  corporate/3.0/i586/X11R6-contrib-4.3-32.15.C30mdk.i586.rpm
 d7dc44b08ae02df79df8a2f215013dba  corporate/3.0/i586/XFree86-100dpi-fonts-4.3-32.15.C30mdk.i586.rpm
 9417e84fc3f0e6e84d04efbcbb813657  corporate/3.0/i586/XFree86-4.3-32.15.C30mdk.i586.rpm
 8c31072dc21135ef055f9581012a87f4  corporate/3.0/i586/XFree86-75dpi-fonts-4.3-32.15.C30mdk.i586.rpm
 4081b67e881dce355c7a1ea1fc080052  corporate/3.0/i586/XFree86-Xnest-4.3-32.15.C30mdk.i586.rpm
 411a7ba5603126d8d1b7e1aa39a58b8d  corporate/3.0/i586/XFree86-Xvfb-4.3-32.15.C30mdk.i586.rpm
 0c23c135b3287f36409e9ec9090e41da  corporate/3.0/i586/XFree86-cyrillic-fonts-4.3-32.15.C30mdk.i586.rpm
 cdeec4de08d0a007eb808c2b45628b7c  corporate/3.0/i586/XFree86-doc-4.3-32.15.C30mdk.i586.rpm
 92db94203737fbb3aa633f24570de55f  corporate/3.0/i586/XFree86-glide-module-4.3-32.15.C30mdk.i586.rpm
 0e6f2844da5b19134c9a577a587a3972  corporate/3.0/i586/XFree86-server-4.3-32.15.C30mdk.i586.rpm
 ad3811b39ed3eb16389d25ba63a9bb12  corporate/3.0/i586/XFree86-xfs-4.3-32.15.C30mdk.i586.rpm
 d128d5d3510f6006f24e430ce284abe8  corporate/3.0/i586/libxfree86-4.3-32.15.C30mdk.i586.rpm
 8c3daa3ddc0cfc02b6a533486b5205ca  corporate/3.0/i586/libxfree86-devel-4.3-32.15.C30mdk.i586.rpm
 6e6ba11a9108e3d1eb5eee2e49258e1b  corporate/3.0/i586/libxfree86-static-devel-4.3-32.15.C30mdk.i586.rpm 
 c6ab0fa0baee5dba4a1387edd17e9d66  corporate/3.0/SRPMS/XFree86-4.3-32.15.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 c8196dcee230fb85dfbc3f31fdfd2647  corporate/3.0/x86_64/X11R6-contrib-4.3-32.15.C30mdk.x86_64.rpm
 03f0c7b57884c903bcda039946af56ec  corporate/3.0/x86_64/XFree86-100dpi-fonts-4.3-32.15.C30mdk.x86_64.rpm
 2a3715df350a35556cbf538b480a46a8  corporate/3.0/x86_64/XFree86-4.3-32.15.C30mdk.x86_64.rpm
 bf88bd71991d906ee860f61ccdd1fdb3  corporate/3.0/x86_64/XFree86-75dpi-fonts-4.3-32.15.C30mdk.x86_64.rpm
 9c23466d3edf760f78d7556de9ad48f2  corporate/3.0/x86_64/XFree86-Xnest-4.3-32.15.C30mdk.x86_64.rpm
 5ed72dfb027ff9f04ec1c4e6e7e673fd  corporate/3.0/x86_64/XFree86-Xvfb-4.3-32.15.C30mdk.x86_64.rpm
 61c0fe60ed278ec94ce513134a05a9d2  corporate/3.0/x86_64/XFree86-cyrillic-fonts-4.3-32.15.C30mdk.x86_64.rpm
 a2ae652d88c648b9555e1579717f7c7d  corporate/3.0/x86_64/XFree86-doc-4.3-32.15.C30mdk.x86_64.rpm
 cd0b21b902fd2b2de31810d86a294b7f  corporate/3.0/x86_64/XFree86-server-4.3-32.15.C30mdk.x86_64.rpm
 24cef9af7fbaf1e19adba76c3fe9b244  corporate/3.0/x86_64/XFree86-xfs-4.3-32.15.C30mdk.x86_64.rpm
 d48804766743b3104fd47f95b615d0fc  corporate/3.0/x86_64/lib64xfree86-4.3-32.15.C30mdk.x86_64.rpm
 f5162ea84f6557df38fcd5d3fb810b39  corporate/3.0/x86_64/lib64xfree86-devel-4.3-32.15.C30mdk.x86_64.rpm
 ef2c80adf27aec9fc5f925e1986cc906  corporate/3.0/x86_64/lib64xfree86-static-devel-4.3-32.15.C30mdk.x86_64.rpm 
 c6ab0fa0baee5dba4a1387edd17e9d66  corporate/3.0/SRPMS/XFree86-4.3-32.15.C30mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (GNU/Linux)

iD8DBQFHl+ZOmqjQ0CJFipgRAnukAJ9Y3dGZBx8FmOp3XvDci5EIT1zRvgCgrp5a
aQfaaPUaI5huI1r1G4HVc8k=
=uEgI
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ