[Whitebox-announce] [WBSA-2004:061-01] Updated XFree86 packages fix privilege escalation vulnerability

John Morris jmorris@beau.org
Tue, 17 Feb 2004 22:40:59 -0600 (CST)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ----------------------------------------------------------------------
                   Security Advisory

Synopsis:          Updated XFree86 packages fix privilege escalation vulnerability
Advisory ID:       WBSA-2004:061-01
Issue date:        2004-02-13
Updated on:        2004-02-17
Product:           White Box Enterprise Linux 3.0 (i386)
Keywords:          
Cross references:  
Obsoletes:         
CVE Names:         CAN-2004-0083 CAN-2004-0084 CAN-2004-0106
- ----------------------------------------------------------------------

Updated XFree86 packages that fix a privilege escalation vulnerability are
now available.

More information is available in Red Hat, Inc's original advisory 
available on their site at:

http://www.redhat.com/archives/enterprise-watch-list/2004-February/msg00008.html

To install this new package on your White Box Enterprise Linux system
use the Up2Date Network or Yum.

Note: Be sure to change the default Up2Date or Yum server from the
initial location to prevent undue load to the whiteboxlinux.org
server, which doesn't have a lot of outbound bandwidth.  The config
files already have entries for mirror sites commented out.

Up2Date's configuration file is at /etc/sysconfig/rhn/sources

Yum's configuration is in /etc/yum.conf


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
Comment: Made with pgp4pine 1.76

iD8DBQFAMuzbqME6bvnsqA8RArfFAJ449N9YXrREAoGjkYEMg4IJx5oh1QCcDYOz
MeJQFRzWw8zaaYlzeQdQXj8=
=UPs9
-----END PGP SIGNATURE-----