Updated x11-server packages fix several vulnerabilities
An input validation flaw was found in X.org's Security and Record
extensions. A malicious authorized client could exploit the issue
to cause a denial of service (crash) or possibly execute arbitrary
code with root privileges on the X.org server (CVE-2008-1377).
An input validation flaw was found in X.org's MIT-SHM extension.
A client connected to the X.org server could read arbitrary server
memory, resulting in the disclosure of sensitive data of other users
of the X.org server (CVE-2008-1379).
Multiple integer overflows were found in X.org's Render extension.
A malicious authorized client could explot these issues to cause a
denial of service (crash) or possibly execute arbitrary code with
root privileges on the X.org server (CVE-2008-2360, CVE-2008-2361,
CVE-2008-2362).
In addition, this update corrects a problem that could cause memory
corruption or segfaults in the render code of the vnc server on
Mandriva Linux 2008.1
The updated packages have been patched to prevent these issues.