Security update for xorg-x11

SUSE Security Update: Security update for xorg-x11
Announcement ID: SUSE-SU-2013:1183-1
Rating: moderate
References: #815451 #821663 #821664 #821665 #821667 #821668 #821669 #821670 #821671 #824294
Affected Products:
  • SUSE Linux Enterprise Server 10 SP4
  • SUSE Linux Enterprise Desktop 10 SP4
  • SLE SDK 10 SP4

  • An update that fixes 25 vulnerabilities is now available.

    Description:


    This update of xorg-x11 fixes several security
    vulnerabilities.

    * Bug 815451- X.Org Security Advisory: May 23, 2013
    * Bug 821664 - libX11
    * Bug 821671 - libXv
    * Bug 821670 - libXt
    * Bug 821669 - libXrender
    * Bug 821668 - libXp
    * Bug 821667 - libXfixes
    * Bug 821665 - libXext
    * Bug 821663 - libFS, libXcursor, libXi, libXinerama,
    libXRes, libXtst, libXvMC, libXxf86dga, libXxf86vm, libdmx

    Security Issue references:

    * CVE-2013-1981
    >
    * CVE-2013-1982
    >
    * CVE-2013-1983
    >
    * CVE-2013-1984
    >
    * CVE-2013-1985
    >
    * CVE-2013-1987
    >
    * CVE-2013-1988
    >
    * CVE-2013-1989
    >
    * CVE-2013-1990
    >
    * CVE-2013-1991
    >
    * CVE-2013-1992
    >
    * CVE-2013-1995
    >
    * CVE-2013-1996
    >
    * CVE-2013-1997
    >
    * CVE-2013-1998
    >
    * CVE-2013-1999
    >
    * CVE-2013-2000
    >
    * CVE-2013-2001
    >
    * CVE-2013-2002
    >
    * CVE-2013-2003
    >
    * CVE-2013-2004
    >
    * CVE-2013-2005
    >
    * CVE-2013-2062
    >
    * CVE-2013-2063
    >
    * CVE-2013-2066
    >

    Package List:

    • SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64):
    • xorg-x11-6.9.0-50.84.4
    • xorg-x11-Xnest-6.9.0-50.84.4
    • xorg-x11-Xvfb-6.9.0-50.84.4
    • xorg-x11-Xvnc-6.9.0-50.84.4
    • xorg-x11-devel-6.9.0-50.84.4
    • xorg-x11-doc-6.9.0-50.84.4
    • xorg-x11-fonts-100dpi-6.9.0-50.84.4
    • xorg-x11-fonts-75dpi-6.9.0-50.84.4
    • xorg-x11-fonts-cyrillic-6.9.0-50.84.4
    • xorg-x11-fonts-scalable-6.9.0-50.84.4
    • xorg-x11-fonts-syriac-6.9.0-50.84.4
    • xorg-x11-libs-6.9.0-50.84.4
    • xorg-x11-man-6.9.0-50.84.4
    • SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc x86_64):
    • xorg-x11-sdk-6.9.0-50.84.4
    • xorg-x11-server-6.9.0-50.84.4
    • xorg-x11-server-glx-6.9.0-50.84.4
    • SUSE Linux Enterprise Server 10 SP4 (s390x x86_64):
    • xorg-x11-devel-32bit-6.9.0-50.84.4
    • xorg-x11-libs-32bit-6.9.0-50.84.4
    • SUSE Linux Enterprise Server 10 SP4 (ia64):
    • xorg-x11-libs-x86-6.9.0-50.84.4
    • SUSE Linux Enterprise Server 10 SP4 (ppc):
    • xorg-x11-devel-64bit-6.9.0-50.84.4
    • xorg-x11-libs-64bit-6.9.0-50.84.4
    • SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64):
    • xorg-x11-6.9.0-50.84.4
    • xorg-x11-Xnest-6.9.0-50.84.4
    • xorg-x11-Xvfb-6.9.0-50.84.4
    • xorg-x11-Xvnc-6.9.0-50.84.4
    • xorg-x11-devel-6.9.0-50.84.4
    • xorg-x11-fonts-100dpi-6.9.0-50.84.4
    • xorg-x11-fonts-75dpi-6.9.0-50.84.4
    • xorg-x11-fonts-cyrillic-6.9.0-50.84.4
    • xorg-x11-fonts-scalable-6.9.0-50.84.4
    • xorg-x11-fonts-syriac-6.9.0-50.84.4
    • xorg-x11-libs-6.9.0-50.84.4
    • xorg-x11-man-6.9.0-50.84.4
    • xorg-x11-server-6.9.0-50.84.4
    • xorg-x11-server-glx-6.9.0-50.84.4
    • SUSE Linux Enterprise Desktop 10 SP4 (x86_64):
    • xorg-x11-devel-32bit-6.9.0-50.84.4
    • xorg-x11-libs-32bit-6.9.0-50.84.4
    • SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64):
    • xorg-x11-Xvfb-6.9.0-50.84.4
    • xorg-x11-doc-6.9.0-50.84.4
    • SLE SDK 10 SP4 (i586 ia64 ppc x86_64):
    • xorg-x11-sdk-6.9.0-50.84.4

    References:

    • http://support.novell.com/security/cve/CVE-2013-1981.html
    • http://support.novell.com/security/cve/CVE-2013-1982.html
    • http://support.novell.com/security/cve/CVE-2013-1983.html
    • http://support.novell.com/security/cve/CVE-2013-1984.html
    • http://support.novell.com/security/cve/CVE-2013-1985.html
    • http://support.novell.com/security/cve/CVE-2013-1987.html
    • http://support.novell.com/security/cve/CVE-2013-1988.html
    • http://support.novell.com/security/cve/CVE-2013-1989.html
    • http://support.novell.com/security/cve/CVE-2013-1990.html
    • http://support.novell.com/security/cve/CVE-2013-1991.html
    • http://support.novell.com/security/cve/CVE-2013-1992.html
    • http://support.novell.com/security/cve/CVE-2013-1995.html
    • http://support.novell.com/security/cve/CVE-2013-1996.html
    • http://support.novell.com/security/cve/CVE-2013-1997.html
    • http://support.novell.com/security/cve/CVE-2013-1998.html
    • http://support.novell.com/security/cve/CVE-2013-1999.html
    • http://support.novell.com/security/cve/CVE-2013-2000.html
    • http://support.novell.com/security/cve/CVE-2013-2001.html
    • http://support.novell.com/security/cve/CVE-2013-2002.html
    • http://support.novell.com/security/cve/CVE-2013-2003.html
    • http://support.novell.com/security/cve/CVE-2013-2004.html
    • http://support.novell.com/security/cve/CVE-2013-2005.html
    • http://support.novell.com/security/cve/CVE-2013-2062.html
    • http://support.novell.com/security/cve/CVE-2013-2063.html
    • http://support.novell.com/security/cve/CVE-2013-2066.html
    • https://bugzilla.novell.com/815451
    • https://bugzilla.novell.com/821663
    • https://bugzilla.novell.com/821664
    • https://bugzilla.novell.com/821665
    • https://bugzilla.novell.com/821667
    • https://bugzilla.novell.com/821668
    • https://bugzilla.novell.com/821669
    • https://bugzilla.novell.com/821670
    • https://bugzilla.novell.com/821671
    • https://bugzilla.novell.com/824294
    • http://download.suse.com/patch/finder/?keywords=0d0adbe855f0a576da72ba4a295c3364