-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2013:182 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : mesa Date : June 27, 2013 Affected: Business Server 1.0 _______________________________________________________________________ Problem Description: Updated mesa packages fix multiple vulnerabilties An out-of-bounds access flaw was found in Mesa. If an application using Mesa exposed the Mesa API to untrusted inputs (Mozilla Firefox does this), an attacker could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application (CVE-2013-1872). It was found that Mesa did not correctly validate messages from the X server. A malicious X server could cause an application using Mesa to crash or, potentially, execute arbitrary code with the privileges of the user running the application (CVE-2013-1993). _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1872 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1993 http://advisories.mageia.org/MGASA-2013-0190.html _______________________________________________________________________ Updated Packages: Mandriva Business Server 1/X86_64: f6c149b9c6d323e773b035c66d674950 mbs1/x86_64/lib64dri-drivers-8.0.5-1.1.mbs1.x86_64.rpm d6d3a02aac014c15183d7970001ea26b mbs1/x86_64/lib64gbm1-8.0.5-1.1.mbs1.x86_64.rpm 16421d30fcf1e3a1483f94457c67863b mbs1/x86_64/lib64gbm1-devel-8.0.5-1.1.mbs1.x86_64.rpm 944f58f19d1bcebf748916398a77e44b mbs1/x86_64/lib64glapi0-8.0.5-1.1.mbs1.x86_64.rpm 11bd6d9f5a99b99cc305a03090e15d73 mbs1/x86_64/lib64glapi0-devel-8.0.5-1.1.mbs1.x86_64.rpm 0ec3550458e61ef7774cfb0e12942b60 mbs1/x86_64/lib64mesaegl1-8.0.5-1.1.mbs1.x86_64.rpm 731881a5c0e903d78bb82ba32f2d1311 mbs1/x86_64/lib64mesaegl1-devel-8.0.5-1.1.mbs1.x86_64.rpm df1fe2997d95167bf06f8416f79f367e mbs1/x86_64/lib64mesagl1-8.0.5-1.1.mbs1.x86_64.rpm 2f52c1fcd8628fa9ff4c705c102127cb mbs1/x86_64/lib64mesagl1-devel-8.0.5-1.1.mbs1.x86_64.rpm 631b9aab4dbae2f2d2f4abc4d000228b mbs1/x86_64/lib64mesaglesv1_1-8.0.5-1.1.mbs1.x86_64.rpm 96d888d875add6c574d2edf6718cf5dc mbs1/x86_64/lib64mesaglesv1_1-devel-8.0.5-1.1.mbs1.x86_64.rpm f79a12a85997422fbec1bf987ff02ac8 mbs1/x86_64/lib64mesaglesv2_2-8.0.5-1.1.mbs1.x86_64.rpm 731221cc8ad3cae9ba37e32449a61d97 mbs1/x86_64/lib64mesaglesv2_2-devel-8.0.5-1.1.mbs1.x86_64.rpm 8892fdddb19c43e914af34e975eeb95d mbs1/x86_64/lib64mesaglu1-8.0.5-1.1.mbs1.x86_64.rpm 6c1814baa7930c18f2bbae27d0868b43 mbs1/x86_64/lib64mesaglu1-devel-8.0.5-1.1.mbs1.x86_64.rpm 276e7eed6573335b16aec8a649e99300 mbs1/x86_64/lib64mesaopenvg1-8.0.5-1.1.mbs1.x86_64.rpm 32d9ef8bec2abe8fc22726fbc8649741 mbs1/x86_64/lib64mesaopenvg1-devel-8.0.5-1.1.mbs1.x86_64.rpm dba1a82ae5f142b8359e2905a4916e5f mbs1/x86_64/lib64wayland-egl1-8.0.5-1.1.mbs1.x86_64.rpm ac3cd4fd1194c3ab459954448889e78e mbs1/x86_64/lib64wayland-egl1-devel-8.0.5-1.1.mbs1.x86_64.rpm ec57319a96d89360d32b864e6fe32ac9 mbs1/x86_64/mesa-8.0.5-1.1.mbs1.x86_64.rpm b94216125034d06c78bfc1a6a7f5784c mbs1/x86_64/mesa-common-devel-8.0.5-1.1.mbs1.x86_64.rpm 7b5bcfacd8cf0348d84a53b993d3935f mbs1/SRPMS/mesa-8.0.5-1.1.mbs1.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/en/support/security/advisories/ If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iD8DBQFRzBOLmqjQ0CJFipgRAv8cAKC1TC2KURGen4IQdKVykCyppOqIEwCg34si oIFP9A5+QgNCtB1P8zPaDvw= =p7/e -----END PGP SIGNATURE-----