SUSE-SU-2013:1183-1: moderate: Security update for xorg-x11
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Thu Jul 11 22:04:11 MDT 2013
SUSE Security Update: Security update for xorg-x11
______________________________________________________________________________
Announcement ID: SUSE-SU-2013:1183-1
Rating: moderate
References: #815451 #821663 #821664 #821665 #821667 #821668
#821669 #821670 #821671 #824294
Cross-References: CVE-2013-1981 CVE-2013-1982 CVE-2013-1983
CVE-2013-1984 CVE-2013-1985 CVE-2013-1987
CVE-2013-1988 CVE-2013-1989 CVE-2013-1990
CVE-2013-1991 CVE-2013-1992 CVE-2013-1995
CVE-2013-1996 CVE-2013-1997 CVE-2013-1998
CVE-2013-1999 CVE-2013-2000 CVE-2013-2001
CVE-2013-2002 CVE-2013-2003 CVE-2013-2004
CVE-2013-2005 CVE-2013-2062 CVE-2013-2063
CVE-2013-2066
Affected Products:
SUSE Linux Enterprise Server 10 SP4
SUSE Linux Enterprise Desktop 10 SP4
SLE SDK 10 SP4
______________________________________________________________________________
An update that fixes 25 vulnerabilities is now available.
Description:
This update of xorg-x11 fixes several security
vulnerabilities.
* Bug 815451- X.Org Security Advisory: May 23, 2013
* Bug 821664 - libX11
* Bug 821671 - libXv
* Bug 821670 - libXt
* Bug 821669 - libXrender
* Bug 821668 - libXp
* Bug 821667 - libXfixes
* Bug 821665 - libXext
* Bug 821663 - libFS, libXcursor, libXi, libXinerama,
libXRes, libXtst, libXvMC, libXxf86dga, libXxf86vm, libdmx
Security Issue references:
* CVE-2013-1981
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981
>
* CVE-2013-1982
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1982
>
* CVE-2013-1983
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1983
>
* CVE-2013-1984
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984
>
* CVE-2013-1985
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1985
>
* CVE-2013-1987
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1987
>
* CVE-2013-1988
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1988
>
* CVE-2013-1989
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989
>
* CVE-2013-1990
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1990
>
* CVE-2013-1991
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1991
>
* CVE-2013-1992
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1992
>
* CVE-2013-1995
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995
>
* CVE-2013-1996
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1996
>
* CVE-2013-1997
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997
>
* CVE-2013-1998
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998
>
* CVE-2013-1999
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1999
>
* CVE-2013-2000
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2000
>
* CVE-2013-2001
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2001
>
* CVE-2013-2002
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002
>
* CVE-2013-2003
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2003
>
* CVE-2013-2004
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004
>
* CVE-2013-2005
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005
>
* CVE-2013-2062
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2062
>
* CVE-2013-2063
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2063
>
* CVE-2013-2066
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066
>
Package List:
- SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64):
xorg-x11-6.9.0-50.84.4
xorg-x11-Xnest-6.9.0-50.84.4
xorg-x11-Xvfb-6.9.0-50.84.4
xorg-x11-Xvnc-6.9.0-50.84.4
xorg-x11-devel-6.9.0-50.84.4
xorg-x11-doc-6.9.0-50.84.4
xorg-x11-fonts-100dpi-6.9.0-50.84.4
xorg-x11-fonts-75dpi-6.9.0-50.84.4
xorg-x11-fonts-cyrillic-6.9.0-50.84.4
xorg-x11-fonts-scalable-6.9.0-50.84.4
xorg-x11-fonts-syriac-6.9.0-50.84.4
xorg-x11-libs-6.9.0-50.84.4
xorg-x11-man-6.9.0-50.84.4
- SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc x86_64):
xorg-x11-sdk-6.9.0-50.84.4
xorg-x11-server-6.9.0-50.84.4
xorg-x11-server-glx-6.9.0-50.84.4
- SUSE Linux Enterprise Server 10 SP4 (s390x x86_64):
xorg-x11-devel-32bit-6.9.0-50.84.4
xorg-x11-libs-32bit-6.9.0-50.84.4
- SUSE Linux Enterprise Server 10 SP4 (ia64):
xorg-x11-libs-x86-6.9.0-50.84.4
- SUSE Linux Enterprise Server 10 SP4 (ppc):
xorg-x11-devel-64bit-6.9.0-50.84.4
xorg-x11-libs-64bit-6.9.0-50.84.4
- SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64):
xorg-x11-6.9.0-50.84.4
xorg-x11-Xnest-6.9.0-50.84.4
xorg-x11-Xvfb-6.9.0-50.84.4
xorg-x11-Xvnc-6.9.0-50.84.4
xorg-x11-devel-6.9.0-50.84.4
xorg-x11-fonts-100dpi-6.9.0-50.84.4
xorg-x11-fonts-75dpi-6.9.0-50.84.4
xorg-x11-fonts-cyrillic-6.9.0-50.84.4
xorg-x11-fonts-scalable-6.9.0-50.84.4
xorg-x11-fonts-syriac-6.9.0-50.84.4
xorg-x11-libs-6.9.0-50.84.4
xorg-x11-man-6.9.0-50.84.4
xorg-x11-server-6.9.0-50.84.4
xorg-x11-server-glx-6.9.0-50.84.4
- SUSE Linux Enterprise Desktop 10 SP4 (x86_64):
xorg-x11-devel-32bit-6.9.0-50.84.4
xorg-x11-libs-32bit-6.9.0-50.84.4
- SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64):
xorg-x11-Xvfb-6.9.0-50.84.4
xorg-x11-doc-6.9.0-50.84.4
- SLE SDK 10 SP4 (i586 ia64 ppc x86_64):
xorg-x11-sdk-6.9.0-50.84.4
References:
http://support.novell.com/security/cve/CVE-2013-1981.html
http://support.novell.com/security/cve/CVE-2013-1982.html
http://support.novell.com/security/cve/CVE-2013-1983.html
http://support.novell.com/security/cve/CVE-2013-1984.html
http://support.novell.com/security/cve/CVE-2013-1985.html
http://support.novell.com/security/cve/CVE-2013-1987.html
http://support.novell.com/security/cve/CVE-2013-1988.html
http://support.novell.com/security/cve/CVE-2013-1989.html
http://support.novell.com/security/cve/CVE-2013-1990.html
http://support.novell.com/security/cve/CVE-2013-1991.html
http://support.novell.com/security/cve/CVE-2013-1992.html
http://support.novell.com/security/cve/CVE-2013-1995.html
http://support.novell.com/security/cve/CVE-2013-1996.html
http://support.novell.com/security/cve/CVE-2013-1997.html
http://support.novell.com/security/cve/CVE-2013-1998.html
http://support.novell.com/security/cve/CVE-2013-1999.html
http://support.novell.com/security/cve/CVE-2013-2000.html
http://support.novell.com/security/cve/CVE-2013-2001.html
http://support.novell.com/security/cve/CVE-2013-2002.html
http://support.novell.com/security/cve/CVE-2013-2003.html
http://support.novell.com/security/cve/CVE-2013-2004.html
http://support.novell.com/security/cve/CVE-2013-2005.html
http://support.novell.com/security/cve/CVE-2013-2062.html
http://support.novell.com/security/cve/CVE-2013-2063.html
http://support.novell.com/security/cve/CVE-2013-2066.html
https://bugzilla.novell.com/815451
https://bugzilla.novell.com/821663
https://bugzilla.novell.com/821664
https://bugzilla.novell.com/821665
https://bugzilla.novell.com/821667
https://bugzilla.novell.com/821668
https://bugzilla.novell.com/821669
https://bugzilla.novell.com/821670
https://bugzilla.novell.com/821671
https://bugzilla.novell.com/824294
http://download.novell.com/patch/finder/?keywords=0d0adbe855f0a576da72ba4a295c3364
More information about the sle-security-updates
mailing list