[Whitebox-announce] [WBSA-2004:061-01] Updated XFree86 packages fix privilege escalation
vulnerability
John Morris
jmorris@beau.org
Tue, 17 Feb 2004 22:40:59 -0600 (CST)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ----------------------------------------------------------------------
Security Advisory
Synopsis: Updated XFree86 packages fix privilege escalation vulnerability
Advisory ID: WBSA-2004:061-01
Issue date: 2004-02-13
Updated on: 2004-02-17
Product: White Box Enterprise Linux 3.0 (i386)
Keywords:
Cross references:
Obsoletes:
CVE Names: CAN-2004-0083 CAN-2004-0084 CAN-2004-0106
- ----------------------------------------------------------------------
Updated XFree86 packages that fix a privilege escalation vulnerability are
now available.
More information is available in Red Hat, Inc's original advisory
available on their site at:
http://www.redhat.com/archives/enterprise-watch-list/2004-February/msg00008.html
To install this new package on your White Box Enterprise Linux system
use the Up2Date Network or Yum.
Note: Be sure to change the default Up2Date or Yum server from the
initial location to prevent undue load to the whiteboxlinux.org
server, which doesn't have a lot of outbound bandwidth. The config
files already have entries for mirror sites commented out.
Up2Date's configuration file is at /etc/sysconfig/rhn/sources
Yum's configuration is in /etc/yum.conf
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
Comment: Made with pgp4pine 1.76
iD8DBQFAMuzbqME6bvnsqA8RArfFAJ449N9YXrREAoGjkYEMg4IJx5oh1QCcDYOz
MeJQFRzWw8zaaYlzeQdQXj8=
=UPs9
-----END PGP SIGNATURE-----