---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: Mandriva update for libxfont SECUNIA ADVISORY ID: SA28571 VERIFY ADVISORY: http://secunia.com/advisories/28571/ CRITICAL: Less critical IMPACT: Privilege escalation WHERE: Local system OPERATING SYSTEM: Mandriva Linux 2007 http://secunia.com/product/12165/ DESCRIPTION: Mandriva has issued an update for libxfont. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. For more information: SA28532 SOLUTION: Apply updated packages. Mandriva Linux 2007 de2a22a48e7cd0f6fcd4029488c3b724 2007.0/i586/libxfont1-1.1.0-4.3mdv2007.0.i586.rpm 606851fb030d7f7d823b7937b0bd5edc 2007.0/i586/libxfont1-devel-1.1.0-4.3mdv2007.0.i586.rpm 4cdcd0cd1bfaf72fca9a91a8b1ebf2db 2007.0/i586/libxfont1-static-devel-1.1.0-4.3mdv2007.0.i586.rpm 662b54bd2bee49585526a91812df5ef3 2007.0/SRPMS/libxfont-1.1.0-4.3mdv2007.0.src.rpm Mandriva Linux 2007/X86_64 5194fbab1156016018e1c84256e35a9c 2007.0/x86_64/lib64xfont1-1.1.0-4.3mdv2007.0.x86_64.rpm c1bdcc83564f38832c3d1c6747b95f15 2007.0/x86_64/lib64xfont1-devel-1.1.0-4.3mdv2007.0.x86_64.rpm 0f04e1dfcb4c00a1c9a3dc4b343d9046 2007.0/x86_64/lib64xfont1-static-devel-1.1.0-4.3mdv2007.0.x86_64.rpm 662b54bd2bee49585526a91812df5ef3 2007.0/SRPMS/libxfont-1.1.0-4.3mdv2007.0.src.rpm ORIGINAL ADVISORY: http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:024 OTHER REFERENCES: SA28532: http://secunia.com/advisories/28532/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------