LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: September 2nd, 2014
Linux Advisory Watch: August 29th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Mandriva: 2014:020: x11-server Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Mandrake Updated x11-server package fixes security vulnerability: Bryan Quigley discovered an integer underflow in the Xorg X server which could lead to denial of service or the execution of arbitrary code (CVE-2013-6424). [More...]
 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2014:020
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : x11-server
 Date    : January 22, 2014
 Affected: Business Server 1.0, Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 Updated x11-server package fixes security vulnerability:
 
 Bryan Quigley discovered an integer underflow in the Xorg X server
 which could lead to denial of service or the execution of arbitrary
 code (CVE-2013-6424).
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6424
 http://advisories.mageia.org/MGASA-2014-0016.html
 _______________________________________________________________________

 Updated Packages:

 Mandriva Enterprise Server 5:
 908613d9482582938fa62e33b7f32bd4  mes5/i586/x11-server-1.4.2-11.4mdvmes5.2.i586.rpm
 e12af81d8e7cf5f25ca84a98324b8541  mes5/i586/x11-server-common-1.4.2-11.4mdvmes5.2.i586.rpm
 c05e604dfc4a7f026935ae843eecc69b  mes5/i586/x11-server-devel-1.4.2-11.4mdvmes5.2.i586.rpm
 c0edc59179ba56fc866d89dbe1dcaa78  mes5/i586/x11-server-xdmx-1.4.2-11.4mdvmes5.2.i586.rpm
 01a6c17447af8dc7addceab77d6f6d92  mes5/i586/x11-server-xephyr-1.4.2-11.4mdvmes5.2.i586.rpm
 82c6ddaad3bb32b113e78b1462a9cc7d  mes5/i586/x11-server-xfake-1.4.2-11.4mdvmes5.2.i586.rpm
 8a8dd94871671effe26658baf668d949  mes5/i586/x11-server-xfbdev-1.4.2-11.4mdvmes5.2.i586.rpm
 85b9c2617735976c3a610f02962e794d  mes5/i586/x11-server-xnest-1.4.2-11.4mdvmes5.2.i586.rpm
 f87b0d7a700c3827f0759f6a1b75f372  mes5/i586/x11-server-xorg-1.4.2-11.4mdvmes5.2.i586.rpm
 07105ff2cea8e2c17003f0bde3c79280  mes5/i586/x11-server-xsdl-1.4.2-11.4mdvmes5.2.i586.rpm
 fcefb95feb1e902ec802a0e0361507a1  mes5/i586/x11-server-xvfb-1.4.2-11.4mdvmes5.2.i586.rpm
 aa010ea14ff34e2b9c839eb23b8c74df  mes5/i586/x11-server-xvnc-1.4.2-11.4mdvmes5.2.i586.rpm 
 95f03adb99d07b7d63e256dd622660cf  mes5/SRPMS/x11-server-1.4.2-11.4mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 8b526c82d4f315eb44970561b1d17866  mes5/x86_64/x11-server-1.4.2-11.4mdvmes5.2.x86_64.rpm
 1cb321d41d16b3dfef580ed54c81bca4  mes5/x86_64/x11-server-common-1.4.2-11.4mdvmes5.2.x86_64.rpm
 4c4bd46949e2b6a61cdc2735b2c5a72f  mes5/x86_64/x11-server-devel-1.4.2-11.4mdvmes5.2.x86_64.rpm
 6abbb9dfdd8f865f213d2e95dcbbbf4b  mes5/x86_64/x11-server-xdmx-1.4.2-11.4mdvmes5.2.x86_64.rpm
 665b8d99be3cc3457070e1cc5000949d  mes5/x86_64/x11-server-xephyr-1.4.2-11.4mdvmes5.2.x86_64.rpm
 2004a0efc184141cb55233e75b0c5d5b  mes5/x86_64/x11-server-xfake-1.4.2-11.4mdvmes5.2.x86_64.rpm
 67bbfe03b1112aee13cc9e5ef30371f3  mes5/x86_64/x11-server-xfbdev-1.4.2-11.4mdvmes5.2.x86_64.rpm
 407da60675a417c02e4349d66174ffc3  mes5/x86_64/x11-server-xnest-1.4.2-11.4mdvmes5.2.x86_64.rpm
 3507417767fd7f091cf15c54a842dd3c  mes5/x86_64/x11-server-xorg-1.4.2-11.4mdvmes5.2.x86_64.rpm
 0bf194cb2cf48741027e43b475529831  mes5/x86_64/x11-server-xsdl-1.4.2-11.4mdvmes5.2.x86_64.rpm
 9c39aa8195ee73675c93ba8ecb87f125  mes5/x86_64/x11-server-xvfb-1.4.2-11.4mdvmes5.2.x86_64.rpm
 da9e4c1f750f5bda694057c8dade071a  mes5/x86_64/x11-server-xvnc-1.4.2-11.4mdvmes5.2.x86_64.rpm 
 95f03adb99d07b7d63e256dd622660cf  mes5/SRPMS/x11-server-1.4.2-11.4mdvmes5.2.src.rpm

 Mandriva Business Server 1/X86_64:
 6b18d1195af47833ae940427ecfae2db  mbs1/x86_64/x11-server-1.11.4-12.4.mbs1.x86_64.rpm
 3b68e9054f78cacc7e0c569f75e701ec  mbs1/x86_64/x11-server-common-1.11.4-12.4.mbs1.x86_64.rpm
 fed36b01b53dfb8268d55dafe3d049bd  mbs1/x86_64/x11-server-devel-1.11.4-12.4.mbs1.x86_64.rpm
 cd4add35d1504cf8ce23a4719ee9583b  mbs1/x86_64/x11-server-source-1.11.4-12.4.mbs1.noarch.rpm
 e95c29d35a1d3776563fc0d4c3730dc7  mbs1/x86_64/x11-server-xdmx-1.11.4-12.4.mbs1.x86_64.rpm
 dec1324d8415a534313ae3865e7bbf60  mbs1/x86_64/x11-server-xephyr-1.11.4-12.4.mbs1.x86_64.rpm
 17ae85ad5ef3179af048b44244f364df  mbs1/x86_64/x11-server-xfake-1.11.4-12.4.mbs1.x86_64.rpm
 6371ff1e1dc720807a9555b762c99c11  mbs1/x86_64/x11-server-xfbdev-1.11.4-12.4.mbs1.x86_64.rpm
 ce121d0fdb82cc90b769ee2de130f77a  mbs1/x86_64/x11-server-xnest-1.11.4-12.4.mbs1.x86_64.rpm
 e49a81ca1f71d346550355f5a73aa117  mbs1/x86_64/x11-server-xorg-1.11.4-12.4.mbs1.x86_64.rpm
 b9a0c8b92642a451a0cc859385669f52  mbs1/x86_64/x11-server-xvfb-1.11.4-12.4.mbs1.x86_64.rpm 
 57f78b37d102a48d22d3a4045c247e95  mbs1/SRPMS/x11-server-1.11.4-12.4.mbs1.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/en/support/security/advisories/

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.