Mandriva Linux Security Advisory 2013-181 - Multiple integer overflows in X.org libGLX in Mesa 9.1.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XF86DRIOpenConnection and XF86DRIGetClientDriverName functions. The updated packages have been patched to correct this issue.
a4beeeb10e775810693019d4dc5ba38575cb1e9c3f90070c99872a9c19730354
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2013:181
https://www.mandriva.com/en/support/security/
_______________________________________________________________________
Package : mesa
Date : June 27, 2013
Affected: Enterprise Server 5.0
_______________________________________________________________________
Problem Description:
A vulnerability has been discovered and corrected in mesa:
Multiple integer overflows in X.org libGLX in Mesa 9.1.1 and earlier
allow X servers to trigger allocation of insufficient memory and a
buffer overflow via vectors related to the (1) XF86DRIOpenConnection
and (2) XF86DRIGetClientDriverName functions (CVE-2013-1993).
The updated packages have been patched to correct this issue.
_______________________________________________________________________
References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1993
https://lists.freedesktop.org/archives/mesa-dev/2013-May/039720.html
https://lists.freedesktop.org/archives/mesa-dev/2013-May/039722.html
_______________________________________________________________________
Updated Packages:
Mandriva Enterprise Server 5:
a80058aedd53778d56658d2cebd2ae80 mes5/i586/libmesagl1-7.0.4-1.4mdvmes5.2.i586.rpm
1d5da9edd307d274659277ab4fa5a57e mes5/i586/libmesagl1-devel-7.0.4-1.4mdvmes5.2.i586.rpm
6c601ea241fed38f40ca1eed9e8ab89b mes5/i586/libmesaglu1-7.0.4-1.4mdvmes5.2.i586.rpm
15b44189c834b0030a306aa669a0b0e2 mes5/i586/libmesaglu1-devel-7.0.4-1.4mdvmes5.2.i586.rpm
207476a24441ba5fa111e8b633a24774 mes5/i586/libmesaglut3-7.0.4-1.4mdvmes5.2.i586.rpm
145ab95743ca7b7250ab466c81118078 mes5/i586/libmesaglut3-devel-7.0.4-1.4mdvmes5.2.i586.rpm
b24058186697a4944adbeda751042565 mes5/i586/libmesaglw1-7.0.4-1.4mdvmes5.2.i586.rpm
103ebd10d3d1d3decea93625015fbe37 mes5/i586/libmesaglw1-devel-7.0.4-1.4mdvmes5.2.i586.rpm
b4ce44b1875a91b833cfd882ce3d6cbb mes5/i586/mesa-7.0.4-1.4mdvmes5.2.i586.rpm
992a4283605135f5185952940630db50 mes5/i586/mesa-common-devel-7.0.4-1.4mdvmes5.2.i586.rpm
20b963ad244072c2db02e65fc4db3847 mes5/i586/mesa-demos-7.0.4-1.4mdvmes5.2.i586.rpm
daa1d4025df4c06a0d3f5b7f7e41f40f mes5/i586/mesa-source-7.0.4-1.4mdvmes5.2.i586.rpm
e152a5b9632bdea99487b68c38a519c8 mes5/SRPMS/mesa-7.0.4-1.4mdvmes5.2.src.rpm
Mandriva Enterprise Server 5/X86_64:
6e800f71f35c12777c67fc76f10e0b10 mes5/x86_64/lib64mesagl1-7.0.4-1.4mdvmes5.2.x86_64.rpm
b0d857c985a68180102f7604cab37dfb mes5/x86_64/lib64mesagl1-devel-7.0.4-1.4mdvmes5.2.x86_64.rpm
f8f79c715a5c70d8b689ac041d1cad43 mes5/x86_64/lib64mesaglu1-7.0.4-1.4mdvmes5.2.x86_64.rpm
fff9884ddbea8eb5686382a2d9d3c984 mes5/x86_64/lib64mesaglu1-devel-7.0.4-1.4mdvmes5.2.x86_64.rpm
b5a044658b00b64e4ea7d704ab659bfc mes5/x86_64/lib64mesaglut3-7.0.4-1.4mdvmes5.2.x86_64.rpm
3b67a397b772da1a763754b358a7e5cf mes5/x86_64/lib64mesaglut3-devel-7.0.4-1.4mdvmes5.2.x86_64.rpm
bbb5c93024c22cebb806ed63cda2f4c3 mes5/x86_64/lib64mesaglw1-7.0.4-1.4mdvmes5.2.x86_64.rpm
964e1864d643d55deabe6b272a246731 mes5/x86_64/lib64mesaglw1-devel-7.0.4-1.4mdvmes5.2.x86_64.rpm
bd9aeec587b0e15b15024d924b52208c mes5/x86_64/mesa-7.0.4-1.4mdvmes5.2.x86_64.rpm
34ad2076786e6c180a7e4c239cec96e6 mes5/x86_64/mesa-common-devel-7.0.4-1.4mdvmes5.2.x86_64.rpm
5eac0081c6589453d2f93ba5a924f8cb mes5/x86_64/mesa-demos-7.0.4-1.4mdvmes5.2.x86_64.rpm
163c287a0890b18eb024a9c172503ba6 mes5/x86_64/mesa-source-7.0.4-1.4mdvmes5.2.x86_64.rpm
e152a5b9632bdea99487b68c38a519c8 mes5/SRPMS/mesa-7.0.4-1.4mdvmes5.2.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
https://www.mandriva.com/en/support/security/advisories/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iD8DBQFRzBB8mqjQ0CJFipgRAuFJAKDEpJFxgNtjFlFYJK97qtORrd9jawCfV0H6
4KDlbnni9N0Rt8oiL0z1oro=
=wZ7F
-----END PGP SIGNATURE-----