[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1W60tI-0001uv-Lx@titan.mandriva.com>
Date: Wed, 22 Jan 2014 17:43:00 +0100
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2014:020 ] x11-server
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2014:020
http://www.mandriva.com/en/support/security/
_______________________________________________________________________
Package : x11-server
Date : January 22, 2014
Affected: Business Server 1.0, Enterprise Server 5.0
_______________________________________________________________________
Problem Description:
Updated x11-server package fixes security vulnerability:
Bryan Quigley discovered an integer underflow in the Xorg X server
which could lead to denial of service or the execution of arbitrary
code (CVE-2013-6424).
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6424
http://advisories.mageia.org/MGASA-2014-0016.html
_______________________________________________________________________
Updated Packages:
Mandriva Enterprise Server 5:
908613d9482582938fa62e33b7f32bd4 mes5/i586/x11-server-1.4.2-11.4mdvmes5.2.i586.rpm
e12af81d8e7cf5f25ca84a98324b8541 mes5/i586/x11-server-common-1.4.2-11.4mdvmes5.2.i586.rpm
c05e604dfc4a7f026935ae843eecc69b mes5/i586/x11-server-devel-1.4.2-11.4mdvmes5.2.i586.rpm
c0edc59179ba56fc866d89dbe1dcaa78 mes5/i586/x11-server-xdmx-1.4.2-11.4mdvmes5.2.i586.rpm
01a6c17447af8dc7addceab77d6f6d92 mes5/i586/x11-server-xephyr-1.4.2-11.4mdvmes5.2.i586.rpm
82c6ddaad3bb32b113e78b1462a9cc7d mes5/i586/x11-server-xfake-1.4.2-11.4mdvmes5.2.i586.rpm
8a8dd94871671effe26658baf668d949 mes5/i586/x11-server-xfbdev-1.4.2-11.4mdvmes5.2.i586.rpm
85b9c2617735976c3a610f02962e794d mes5/i586/x11-server-xnest-1.4.2-11.4mdvmes5.2.i586.rpm
f87b0d7a700c3827f0759f6a1b75f372 mes5/i586/x11-server-xorg-1.4.2-11.4mdvmes5.2.i586.rpm
07105ff2cea8e2c17003f0bde3c79280 mes5/i586/x11-server-xsdl-1.4.2-11.4mdvmes5.2.i586.rpm
fcefb95feb1e902ec802a0e0361507a1 mes5/i586/x11-server-xvfb-1.4.2-11.4mdvmes5.2.i586.rpm
aa010ea14ff34e2b9c839eb23b8c74df mes5/i586/x11-server-xvnc-1.4.2-11.4mdvmes5.2.i586.rpm
95f03adb99d07b7d63e256dd622660cf mes5/SRPMS/x11-server-1.4.2-11.4mdvmes5.2.src.rpm
Mandriva Enterprise Server 5/X86_64:
8b526c82d4f315eb44970561b1d17866 mes5/x86_64/x11-server-1.4.2-11.4mdvmes5.2.x86_64.rpm
1cb321d41d16b3dfef580ed54c81bca4 mes5/x86_64/x11-server-common-1.4.2-11.4mdvmes5.2.x86_64.rpm
4c4bd46949e2b6a61cdc2735b2c5a72f mes5/x86_64/x11-server-devel-1.4.2-11.4mdvmes5.2.x86_64.rpm
6abbb9dfdd8f865f213d2e95dcbbbf4b mes5/x86_64/x11-server-xdmx-1.4.2-11.4mdvmes5.2.x86_64.rpm
665b8d99be3cc3457070e1cc5000949d mes5/x86_64/x11-server-xephyr-1.4.2-11.4mdvmes5.2.x86_64.rpm
2004a0efc184141cb55233e75b0c5d5b mes5/x86_64/x11-server-xfake-1.4.2-11.4mdvmes5.2.x86_64.rpm
67bbfe03b1112aee13cc9e5ef30371f3 mes5/x86_64/x11-server-xfbdev-1.4.2-11.4mdvmes5.2.x86_64.rpm
407da60675a417c02e4349d66174ffc3 mes5/x86_64/x11-server-xnest-1.4.2-11.4mdvmes5.2.x86_64.rpm
3507417767fd7f091cf15c54a842dd3c mes5/x86_64/x11-server-xorg-1.4.2-11.4mdvmes5.2.x86_64.rpm
0bf194cb2cf48741027e43b475529831 mes5/x86_64/x11-server-xsdl-1.4.2-11.4mdvmes5.2.x86_64.rpm
9c39aa8195ee73675c93ba8ecb87f125 mes5/x86_64/x11-server-xvfb-1.4.2-11.4mdvmes5.2.x86_64.rpm
da9e4c1f750f5bda694057c8dade071a mes5/x86_64/x11-server-xvnc-1.4.2-11.4mdvmes5.2.x86_64.rpm
95f03adb99d07b7d63e256dd622660cf mes5/SRPMS/x11-server-1.4.2-11.4mdvmes5.2.src.rpm
Mandriva Business Server 1/X86_64:
6b18d1195af47833ae940427ecfae2db mbs1/x86_64/x11-server-1.11.4-12.4.mbs1.x86_64.rpm
3b68e9054f78cacc7e0c569f75e701ec mbs1/x86_64/x11-server-common-1.11.4-12.4.mbs1.x86_64.rpm
fed36b01b53dfb8268d55dafe3d049bd mbs1/x86_64/x11-server-devel-1.11.4-12.4.mbs1.x86_64.rpm
cd4add35d1504cf8ce23a4719ee9583b mbs1/x86_64/x11-server-source-1.11.4-12.4.mbs1.noarch.rpm
e95c29d35a1d3776563fc0d4c3730dc7 mbs1/x86_64/x11-server-xdmx-1.11.4-12.4.mbs1.x86_64.rpm
dec1324d8415a534313ae3865e7bbf60 mbs1/x86_64/x11-server-xephyr-1.11.4-12.4.mbs1.x86_64.rpm
17ae85ad5ef3179af048b44244f364df mbs1/x86_64/x11-server-xfake-1.11.4-12.4.mbs1.x86_64.rpm
6371ff1e1dc720807a9555b762c99c11 mbs1/x86_64/x11-server-xfbdev-1.11.4-12.4.mbs1.x86_64.rpm
ce121d0fdb82cc90b769ee2de130f77a mbs1/x86_64/x11-server-xnest-1.11.4-12.4.mbs1.x86_64.rpm
e49a81ca1f71d346550355f5a73aa117 mbs1/x86_64/x11-server-xorg-1.11.4-12.4.mbs1.x86_64.rpm
b9a0c8b92642a451a0cc859385669f52 mbs1/x86_64/x11-server-xvfb-1.11.4-12.4.mbs1.x86_64.rpm
57f78b37d102a48d22d3a4045c247e95 mbs1/SRPMS/x11-server-1.11.4-12.4.mbs1.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/support/security/advisories/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iD8DBQFS38kdmqjQ0CJFipgRAsb4AKDkIvZMt07yNLimzTiEj8im/ReTgQCeMCAZ
fahmlvLY54+t5KgbcKVXTdg=
=FLet
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists