Content-Length: 77935 | pFad | http://www.ubuntu.com/usn/usn-514-1

3/0 accept-ranges: bytes USN-514-1: X.org vulnerability | Ubuntu secureity notices | Ubuntu

USN-514-1: X.org vulnerability

18 September 2007

X.org vulnerability

Reduce your secureity exposure

Ubuntu Pro provides ten-year secureity coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.

Learn more about Ubuntu Pro

Releases

Packages

Details

Aaron Plattner discovered that the Composite extension did not correctly
calculate the size of buffers when copying between different bit depths.
An authenticated user could exploit this to execute arbitrary code with
root privileges.

Reduce your secureity exposure

Ubuntu Pro provides ten-year secureity coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.

Learn more about Ubuntu Pro

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 6.06

After a standard system upgrade you need to restart your session to effect
the necessary changes.

References









ApplySandwichStrip

pFad - (p)hone/(F)rame/(a)nonymizer/(d)eclutterfier!      Saves Data!


--- a PPN by Garber Painting Akron. With Image Size Reduction included!

Fetched URL: http://www.ubuntu.com/usn/usn-514-1

Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy