---------------------------------------------------------------------- Hardcore Disassembler / Reverse Engineer Wanted! Want to work with IDA and BinDiff? Want to write PoC's and Exploits? Your nationality is not important. We will get you a work permit, find an apartment, and offer a relocation compensation package. http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: Mandriva update for xorg-x11 SECUNIA ADVISORY ID: SA21626 VERIFY ADVISORY: http://secunia.com/advisories/21626/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Mandriva Linux 2006 http://secunia.com/product/9020/ DESCRIPTION: Mandriva has issued an update for xorg-x11. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. For more information: SA20100 SOLUTION: Apply updated packages. Mandrivalinux 2006 e96690462ea6e57335b457d763e26b80 2006.0/RPMS/libxorg-x11-6.9.0-5.8.20060mdk.i586.rpm 31f632a499f6a55459ce5446ad5871b5 2006.0/RPMS/libxorg-x11-devel-6.9.0-5.8.20060mdk.i586.rpm 1c0eda1098546a703159832671e10e99 2006.0/RPMS/libxorg-x11-static-devel-6.9.0-5.8.20060mdk.i586.rpm 5ac9c8c715cb5df656ccbacec5a87dae 2006.0/RPMS/X11R6-contrib-6.9.0-5.8.20060mdk.i586.rpm ac15309aaeb2a021658314afde737da4 2006.0/RPMS/xorg-x11-100dpi-fonts-6.9.0-5.8.20060mdk.i586.rpm f155986261ac4d70982f68b51a38c3dc 2006.0/RPMS/xorg-x11-6.9.0-5.8.20060mdk.i586.rpm 1c7afcc1116ae6db0df1fbec846c552f 2006.0/RPMS/xorg-x11-75dpi-fonts-6.9.0-5.8.20060mdk.i586.rpm 2273cbc4aac47f3060e39a5bebc69392 2006.0/RPMS/xorg-x11-cyrillic-fonts-6.9.0-5.8.20060mdk.i586.rpm f67859d61e75afe3bcc1e481e346c72c 2006.0/RPMS/xorg-x11-doc-6.9.0-5.8.20060mdk.i586.rpm f2685335f3b56d1e4d00f629fc4c4bad 2006.0/RPMS/xorg-x11-glide-module-6.9.0-5.8.20060mdk.i586.rpm dbb7aecf3aa04ebdd98ce07a2d8e7ba5 2006.0/RPMS/xorg-x11-server-6.9.0-5.8.20060mdk.i586.rpm bdb37de9d95ac078fa2e1a0e87de7a5e 2006.0/RPMS/xorg-x11-xauth-6.9.0-5.8.20060mdk.i586.rpm 06022dee267d75d01ff580a9e7afa3d4 2006.0/RPMS/xorg-x11-Xdmx-6.9.0-5.8.20060mdk.i586.rpm 483903328a38387fc0d0584e5478d474 2006.0/RPMS/xorg-x11-xfs-6.9.0-5.8.20060mdk.i586.rpm 6c720d145e82cfa47b3ffabae2b5493a 2006.0/RPMS/xorg-x11-Xnest-6.9.0-5.8.20060mdk.i586.rpm bc7b594caa1d2142eb32f25e5a8bbf57 2006.0/RPMS/xorg-x11-Xprt-6.9.0-5.8.20060mdk.i586.rpm 5861d29021e989dd2ebcc668c6620444 2006.0/RPMS/xorg-x11-Xvfb-6.9.0-5.8.20060mdk.i586.rpm 5915dadb375c54be929c6f336b7c0231 2006.0/SRPMS/xorg-x11-6.9.0-5.8.20060mdk.src.rpm Mandrivalinux 2006/X86_64 2f0e74defdcef7544d949eaef81051b7 x86_64/2006.0/RPMS/lib64xorg-x11-6.9.0-5.8.20060mdk.x86_64.rpm f9dca9d58a256e537586df14f0f3709b x86_64/2006.0/RPMS/lib64xorg-x11-devel-6.9.0-5.8.20060mdk.x86_64.rpm ff60d844dbf4f376a2e7ec5468cd5701 x86_64/2006.0/RPMS/lib64xorg-x11-static-devel-6.9.0-5.8.20060mdk.x86_64.rpm 3d7251620e95952a72708a25a9d6b9ad x86_64/2006.0/RPMS/X11R6-contrib-6.9.0-5.8.20060mdk.x86_64.rpm ae47c639f87ca7238c54449e4dac06e4 x86_64/2006.0/RPMS/xorg-x11-100dpi-fonts-6.9.0-5.8.20060mdk.x86_64.rpm a9b1178ae4b51e0f04ca6ab305b7dd00 x86_64/2006.0/RPMS/xorg-x11-6.9.0-5.8.20060mdk.x86_64.rpm 1c53adb504f5bdd86123e8cc470e2316 x86_64/2006.0/RPMS/xorg-x11-75dpi-fonts-6.9.0-5.8.20060mdk.x86_64.rpm 49f3696276eb8d8db9894ad74aa300e7 x86_64/2006.0/RPMS/xorg-x11-cyrillic-fonts-6.9.0-5.8.20060mdk.x86_64.rpm f2b94e866eeafb9db914990f19ace8c7 x86_64/2006.0/RPMS/xorg-x11-doc-6.9.0-5.8.20060mdk.x86_64.rpm f31dd3184054ea253f98e9b628a835e4 x86_64/2006.0/RPMS/xorg-x11-glide-module-6.9.0-5.8.20060mdk.x86_64.rpm 2f17814f669ec11941bf1a8d72213cfa x86_64/2006.0/RPMS/xorg-x11-server-6.9.0-5.8.20060mdk.x86_64.rpm b55e6ba22af3d404d83a4e6c762620b1 x86_64/2006.0/RPMS/xorg-x11-xauth-6.9.0-5.8.20060mdk.x86_64.rpm 130f98fbbbd53c49f1af4a174ce46d48 x86_64/2006.0/RPMS/xorg-x11-Xdmx-6.9.0-5.8.20060mdk.x86_64.rpm 263baf4aa6f429af65a4f22c25b1f967 x86_64/2006.0/RPMS/xorg-x11-xfs-6.9.0-5.8.20060mdk.x86_64.rpm 893c19c630ef1c6adcc189c7e87fd533 x86_64/2006.0/RPMS/xorg-x11-Xnest-6.9.0-5.8.20060mdk.x86_64.rpm 9e83acc573420cebe10682e38e9435ac x86_64/2006.0/RPMS/xorg-x11-Xprt-6.9.0-5.8.20060mdk.x86_64.rpm 7d562d5dcccc236eee9e9b62e68297f4 x86_64/2006.0/RPMS/xorg-x11-Xvfb-6.9.0-5.8.20060mdk.x86_64.rpm 5915dadb375c54be929c6f336b7c0231 x86_64/2006.0/SRPMS/xorg-x11-6.9.0-5.8.20060mdk.src.rpm ORIGINAL ADVISORY: http://www.mandriva.com/security/advisories?name=MDKSA-2006:148 OTHER REFERENCES: SA20100: http://secunia.com/advisories/20100/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------