LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: October 20th, 2014
Linux Advisory Watch: October 17th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Mandriva: 2013:164: mesa Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Mandrake Updated mesa packages fix security vulnerability: It was discovered that Mesa incorrectly handled certain arrays. An attacker could use this issue to cause Mesa to crash, resulting in a denial of service, or possibly execute arbitrary code (CVE-2012-5129). [More...]
 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2013:164
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : mesa
 Date    : May 13, 2013
 Affected: Business Server 1.0
 _______________________________________________________________________

 Problem Description:

 Updated mesa packages fix security vulnerability:
 
 It was discovered that Mesa incorrectly handled certain arrays. An
 attacker could use this issue to cause Mesa to crash, resulting in a
 denial of service, or possibly execute arbitrary code (CVE-2012-5129).
 
 Mesa has also been updated to version 8.0.5, fixing several bugs.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5129
 https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0143
 _______________________________________________________________________

 Updated Packages:

 Mandriva Business Server 1/X86_64:
 cb06a5cac3f9fa3f0d2c866598aa7a36  mbs1/x86_64/lib64dri-drivers-8.0.5-1.mbs1.x86_64.rpm
 f2a98f31e037cb3abca4bf4e7add59ba  mbs1/x86_64/lib64gbm1-8.0.5-1.mbs1.x86_64.rpm
 3db027f3349da9f87af8e255e7504e1e  mbs1/x86_64/lib64gbm1-devel-8.0.5-1.mbs1.x86_64.rpm
 9b0c52329f3c4315a6fe8bcf97bf5bbf  mbs1/x86_64/lib64glapi0-8.0.5-1.mbs1.x86_64.rpm
 261c0587b551dc3a2979e5a793bbd438  mbs1/x86_64/lib64glapi0-devel-8.0.5-1.mbs1.x86_64.rpm
 9d25805e84c684bdf8aa8f76894403ee  mbs1/x86_64/lib64mesaegl1-8.0.5-1.mbs1.x86_64.rpm
 1f961b47739679365dc17c2391430123  mbs1/x86_64/lib64mesaegl1-devel-8.0.5-1.mbs1.x86_64.rpm
 14a189a35767f5839f1be2860b28289a  mbs1/x86_64/lib64mesagl1-8.0.5-1.mbs1.x86_64.rpm
 8122ce03c2dff2f6a9ae68fe76d228ee  mbs1/x86_64/lib64mesagl1-devel-8.0.5-1.mbs1.x86_64.rpm
 3fe4404b1dedd68e95cbbb31a1a8f2b1  mbs1/x86_64/lib64mesaglesv1_1-8.0.5-1.mbs1.x86_64.rpm
 def8114e6723ab4464b767e000f3ec84  mbs1/x86_64/lib64mesaglesv1_1-devel-8.0.5-1.mbs1.x86_64.rpm
 5977b769f9d51677d6e01144e34a6fd7  mbs1/x86_64/lib64mesaglesv2_2-8.0.5-1.mbs1.x86_64.rpm
 277b2b772034d0cf063d8b50e0a1dd48  mbs1/x86_64/lib64mesaglesv2_2-devel-8.0.5-1.mbs1.x86_64.rpm
 6280570c002cc5ae435eafc7ef9c7870  mbs1/x86_64/lib64mesaglu1-8.0.5-1.mbs1.x86_64.rpm
 3fe7ab22b68cead65df8bb71594f940f  mbs1/x86_64/lib64mesaglu1-devel-8.0.5-1.mbs1.x86_64.rpm
 71b6233fe83c13368da65a10ce19be1e  mbs1/x86_64/lib64mesaopenvg1-8.0.5-1.mbs1.x86_64.rpm
 034793f6b661a284bce591d85696c0b4  mbs1/x86_64/lib64mesaopenvg1-devel-8.0.5-1.mbs1.x86_64.rpm
 14eeccb8ce19479c5b213805c13d7e2a  mbs1/x86_64/lib64wayland-egl1-8.0.5-1.mbs1.x86_64.rpm
 234da3b9878104b5f18ae69e91f1e083  mbs1/x86_64/lib64wayland-egl1-devel-8.0.5-1.mbs1.x86_64.rpm
 8cf136a1417283b68c3a5647f8737ea7  mbs1/x86_64/mesa-8.0.5-1.mbs1.x86_64.rpm
 823a8c551215f69e3314f3feecd7c1f7  mbs1/x86_64/mesa-common-devel-8.0.5-1.mbs1.x86_64.rpm 
 5b6a05a53bf9ed88bda5359e53506e96  mbs1/SRPMS/mesa-8.0.5-1.mbs1.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/en/support/security/advisories/

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
USB is now UEC (use with extreme caution)
iPhone Encryption and the Return of the Crypto Wars
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.