what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2013-181

Mandriva Linux Security Advisory 2013-181
Posted Jun 27, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-181 - Multiple integer overflows in X.org libGLX in Mesa 9.1.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XF86DRIOpenConnection and XF86DRIGetClientDriverName functions. The updated packages have been patched to correct this issue.

tags | advisory, overflow
systems | linux, mandriva
advisories | CVE-2013-1993
SHA-256 | a4beeeb10e775810693019d4dc5ba38575cb1e9c3f90070c99872a9c19730354

Mandriva Linux Security Advisory 2013-181

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2013:181
https://www.mandriva.com/en/support/security/
_______________________________________________________________________

Package : mesa
Date : June 27, 2013
Affected: Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

A vulnerability has been discovered and corrected in mesa:

Multiple integer overflows in X.org libGLX in Mesa 9.1.1 and earlier
allow X servers to trigger allocation of insufficient memory and a
buffer overflow via vectors related to the (1) XF86DRIOpenConnection
and (2) XF86DRIGetClientDriverName functions (CVE-2013-1993).

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1993
https://lists.freedesktop.org/archives/mesa-dev/2013-May/039720.html
https://lists.freedesktop.org/archives/mesa-dev/2013-May/039722.html
_______________________________________________________________________

Updated Packages:

Mandriva Enterprise Server 5:
a80058aedd53778d56658d2cebd2ae80 mes5/i586/libmesagl1-7.0.4-1.4mdvmes5.2.i586.rpm
1d5da9edd307d274659277ab4fa5a57e mes5/i586/libmesagl1-devel-7.0.4-1.4mdvmes5.2.i586.rpm
6c601ea241fed38f40ca1eed9e8ab89b mes5/i586/libmesaglu1-7.0.4-1.4mdvmes5.2.i586.rpm
15b44189c834b0030a306aa669a0b0e2 mes5/i586/libmesaglu1-devel-7.0.4-1.4mdvmes5.2.i586.rpm
207476a24441ba5fa111e8b633a24774 mes5/i586/libmesaglut3-7.0.4-1.4mdvmes5.2.i586.rpm
145ab95743ca7b7250ab466c81118078 mes5/i586/libmesaglut3-devel-7.0.4-1.4mdvmes5.2.i586.rpm
b24058186697a4944adbeda751042565 mes5/i586/libmesaglw1-7.0.4-1.4mdvmes5.2.i586.rpm
103ebd10d3d1d3decea93625015fbe37 mes5/i586/libmesaglw1-devel-7.0.4-1.4mdvmes5.2.i586.rpm
b4ce44b1875a91b833cfd882ce3d6cbb mes5/i586/mesa-7.0.4-1.4mdvmes5.2.i586.rpm
992a4283605135f5185952940630db50 mes5/i586/mesa-common-devel-7.0.4-1.4mdvmes5.2.i586.rpm
20b963ad244072c2db02e65fc4db3847 mes5/i586/mesa-demos-7.0.4-1.4mdvmes5.2.i586.rpm
daa1d4025df4c06a0d3f5b7f7e41f40f mes5/i586/mesa-source-7.0.4-1.4mdvmes5.2.i586.rpm
e152a5b9632bdea99487b68c38a519c8 mes5/SRPMS/mesa-7.0.4-1.4mdvmes5.2.src.rpm

Mandriva Enterprise Server 5/X86_64:
6e800f71f35c12777c67fc76f10e0b10 mes5/x86_64/lib64mesagl1-7.0.4-1.4mdvmes5.2.x86_64.rpm
b0d857c985a68180102f7604cab37dfb mes5/x86_64/lib64mesagl1-devel-7.0.4-1.4mdvmes5.2.x86_64.rpm
f8f79c715a5c70d8b689ac041d1cad43 mes5/x86_64/lib64mesaglu1-7.0.4-1.4mdvmes5.2.x86_64.rpm
fff9884ddbea8eb5686382a2d9d3c984 mes5/x86_64/lib64mesaglu1-devel-7.0.4-1.4mdvmes5.2.x86_64.rpm
b5a044658b00b64e4ea7d704ab659bfc mes5/x86_64/lib64mesaglut3-7.0.4-1.4mdvmes5.2.x86_64.rpm
3b67a397b772da1a763754b358a7e5cf mes5/x86_64/lib64mesaglut3-devel-7.0.4-1.4mdvmes5.2.x86_64.rpm
bbb5c93024c22cebb806ed63cda2f4c3 mes5/x86_64/lib64mesaglw1-7.0.4-1.4mdvmes5.2.x86_64.rpm
964e1864d643d55deabe6b272a246731 mes5/x86_64/lib64mesaglw1-devel-7.0.4-1.4mdvmes5.2.x86_64.rpm
bd9aeec587b0e15b15024d924b52208c mes5/x86_64/mesa-7.0.4-1.4mdvmes5.2.x86_64.rpm
34ad2076786e6c180a7e4c239cec96e6 mes5/x86_64/mesa-common-devel-7.0.4-1.4mdvmes5.2.x86_64.rpm
5eac0081c6589453d2f93ba5a924f8cb mes5/x86_64/mesa-demos-7.0.4-1.4mdvmes5.2.x86_64.rpm
163c287a0890b18eb024a9c172503ba6 mes5/x86_64/mesa-source-7.0.4-1.4mdvmes5.2.x86_64.rpm
e152a5b9632bdea99487b68c38a519c8 mes5/SRPMS/mesa-7.0.4-1.4mdvmes5.2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

https://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFRzBB8mqjQ0CJFipgRAuFJAKDEpJFxgNtjFlFYJK97qtORrd9jawCfV0H6
4KDlbnni9N0Rt8oiL0z1oro=
=wZ7F
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    11 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close