lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-id: <E1JI2Ne-0007vp-Ml@artemis.annvix.ca>
Date: Thu, 24 Jan 2008 06:44:34 -0700
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2008:022 ] - Updated xorg-x11 packages fix multiple
 vulnerabilities


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDVSA-2008:022
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : xorg-x11
 Date    : January 23, 2008
 Affected: Corporate 4.0
 _______________________________________________________________________
 
 Problem Description:
 
 Aaron Plattner discovered a buffer overflow in the Composite extension
 of the X.org X server, which if exploited could lead to local privilege
 escalation (CVE-2007-4730).
 
 An input validation flaw was found in the X.org server's XFree86-Misc
 extension that could allow a malicious authorized client to cause
 a denial of service (crash), or potentially execute arbitrary code
 with root privileges on the X.org server (CVE-2007-5760).
 
 A flaw was found in the X.org server's XC-SECURITY extension that
 could allow a local user to verify the existence of an arbitrary file,
 even in directories that are not normally accessible to that user
 (CVE-2007-5958).
 
 A memory corruption flaw was found in the X.org server's XInput
 extension that could allow a malicious authorized client to cause a
 denial of service (crash) or potentially execute arbitrary code with
 root privileges on the X.org server (CVE-2007-6427).
 
 An information disclosure flaw was found in the X.org server's TOG-CUP
 extension that could allow a malicious authorized client to cause
 a denial of service (crash) or potentially view arbitrary memory
 content within the X.org server's address space (CVE-2007-6428).
 
 Two integer overflow flaws were found in the X.org server's EVI and
 MIT-SHM modules that could allow a malicious authorized client to
 cause a denial of service (crash) or potentially execute arbitrary
 code with the privileges of the X.org server (CVE-2007-6429).
 
 A heap-based buffer overflow flaw was found in how the X.org server
 handled malformed font files that could allow a malicious local user
 to potentially execute arbitrary code with the privileges of the
 X.org server (CVE-2008-0006).
 
 The updated packages have been patched to correct these issues.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4730
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5760
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5958
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6427
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6428
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6429
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0006
 _______________________________________________________________________
 
 Updated Packages:
 
 Corporate 4.0:
 745259cf5b88b71fc3bd7789f499d5fa  corporate/4.0/i586/X11R6-contrib-6.9.0-5.17.20060mlcs4.i586.rpm
 52427cf3c1baca4faeb5b0270486afb1  corporate/4.0/i586/libxorg-x11-6.9.0-5.17.20060mlcs4.i586.rpm
 0104d49fd4dc17d675e97bd78c39dcb7  corporate/4.0/i586/libxorg-x11-devel-6.9.0-5.17.20060mlcs4.i586.rpm
 0a4a5623e79a93dc8c9cf149f8802df5  corporate/4.0/i586/libxorg-x11-static-devel-6.9.0-5.17.20060mlcs4.i586.rpm
 7a1a346cbeaccf5529c9369834b9c141  corporate/4.0/i586/xorg-x11-100dpi-fonts-6.9.0-5.17.20060mlcs4.i586.rpm
 8b08ddcbcb9d2e44e113dabbcaa31f3f  corporate/4.0/i586/xorg-x11-6.9.0-5.17.20060mlcs4.i586.rpm
 f9d8d3489804385eeea25f14d431ac6c  corporate/4.0/i586/xorg-x11-75dpi-fonts-6.9.0-5.17.20060mlcs4.i586.rpm
 664c44d87d9aac5923b6ba23c9415a93  corporate/4.0/i586/xorg-x11-Xdmx-6.9.0-5.17.20060mlcs4.i586.rpm
 b987adc63236649ab473d1613a610b59  corporate/4.0/i586/xorg-x11-Xnest-6.9.0-5.17.20060mlcs4.i586.rpm
 1640c9b1f6d92092982ca24d41c3c2cc  corporate/4.0/i586/xorg-x11-Xprt-6.9.0-5.17.20060mlcs4.i586.rpm
 2c327bbfa16512a74ea1e6497312a474  corporate/4.0/i586/xorg-x11-Xvfb-6.9.0-5.17.20060mlcs4.i586.rpm
 bb338bd4893fa9ec954bfdaee111e8fa  corporate/4.0/i586/xorg-x11-cyrillic-fonts-6.9.0-5.17.20060mlcs4.i586.rpm
 226b8d73d9f4752ca96b0af4d8d2dc8c  corporate/4.0/i586/xorg-x11-doc-6.9.0-5.17.20060mlcs4.i586.rpm
 fbc643b4ddff57a15259ebdcee83ae3b  corporate/4.0/i586/xorg-x11-glide-module-6.9.0-5.17.20060mlcs4.i586.rpm
 d094dff242abe72e8629587f407e5372  corporate/4.0/i586/xorg-x11-server-6.9.0-5.17.20060mlcs4.i586.rpm
 cadc6217f3231657004c33a0e4ee8176  corporate/4.0/i586/xorg-x11-xauth-6.9.0-5.17.20060mlcs4.i586.rpm
 090cbdc2ffb0c87e633877a082f618d2  corporate/4.0/i586/xorg-x11-xfs-6.9.0-5.17.20060mlcs4.i586.rpm 
 6fe68d18ca8573fa8f8ef54044f04bd9  corporate/4.0/SRPMS/xorg-x11-6.9.0-5.17.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 aa9933a623aacfb3ef98af60bdf02978  corporate/4.0/x86_64/X11R6-contrib-6.9.0-5.17.20060mlcs4.x86_64.rpm
 c16ee8baaa17ae5559abdf05a68b29b7  corporate/4.0/x86_64/lib64xorg-x11-6.9.0-5.17.20060mlcs4.x86_64.rpm
 dbb91844486b5d2810179df77c79d9cb  corporate/4.0/x86_64/lib64xorg-x11-devel-6.9.0-5.17.20060mlcs4.x86_64.rpm
 c9ef3ba366265a7a98dc7702783d8e0b  corporate/4.0/x86_64/lib64xorg-x11-static-devel-6.9.0-5.17.20060mlcs4.x86_64.rpm
 d13fe9fc2cff5b2586150a90ec5007e0  corporate/4.0/x86_64/xorg-x11-100dpi-fonts-6.9.0-5.17.20060mlcs4.x86_64.rpm
 0b7271ca041dfaffcfc80accb94147e2  corporate/4.0/x86_64/xorg-x11-6.9.0-5.17.20060mlcs4.x86_64.rpm
 19bb3f9eb4b3de572c392502b7fc85b4  corporate/4.0/x86_64/xorg-x11-75dpi-fonts-6.9.0-5.17.20060mlcs4.x86_64.rpm
 b4f05761ce514904d2ca9a4f2d2b0c78  corporate/4.0/x86_64/xorg-x11-Xdmx-6.9.0-5.17.20060mlcs4.x86_64.rpm
 eb0dbdf467755e2e97812e08b5aaa9f4  corporate/4.0/x86_64/xorg-x11-Xnest-6.9.0-5.17.20060mlcs4.x86_64.rpm
 7d6eb9f8fe531fbbbd4103aa7372f20a  corporate/4.0/x86_64/xorg-x11-Xprt-6.9.0-5.17.20060mlcs4.x86_64.rpm
 bc662a72716be2960e8dcc753f6d6000  corporate/4.0/x86_64/xorg-x11-Xvfb-6.9.0-5.17.20060mlcs4.x86_64.rpm
 93f41ba4dadacc7b52e19e6be7bc2e03  corporate/4.0/x86_64/xorg-x11-cyrillic-fonts-6.9.0-5.17.20060mlcs4.x86_64.rpm
 6a4a81a0b5636fabb82076fdf8af77f1  corporate/4.0/x86_64/xorg-x11-doc-6.9.0-5.17.20060mlcs4.x86_64.rpm
 eccbe735c36fa828af2f847e57179654  corporate/4.0/x86_64/xorg-x11-glide-module-6.9.0-5.17.20060mlcs4.x86_64.rpm
 d9a11280a9c4708247bfd57020f8aa72  corporate/4.0/x86_64/xorg-x11-server-6.9.0-5.17.20060mlcs4.x86_64.rpm
 09494026941f6d0c0b1ed762e4a8fa82  corporate/4.0/x86_64/xorg-x11-xauth-6.9.0-5.17.20060mlcs4.x86_64.rpm
 13e12eff1eda79197b9461be4104b37a  corporate/4.0/x86_64/xorg-x11-xfs-6.9.0-5.17.20060mlcs4.x86_64.rpm 
 6fe68d18ca8573fa8f8ef54044f04bd9  corporate/4.0/SRPMS/xorg-x11-6.9.0-5.17.20060mlcs4.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (GNU/Linux)

iD8DBQFHl+cUmqjQ0CJFipgRAt2+AJ46HGoUD5fieNnq20tCGRwfR+fMewCg0TZE
2Cc7L7FbXYig5XK0jVtdGdQ=
=dX6E
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ