SUSE-SU-2013:1183-1: moderate: Security update for xorg-x11

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Thu Jul 11 22:04:11 MDT 2013


   SUSE Security Update: Security update for xorg-x11
______________________________________________________________________________

Announcement ID:    SUSE-SU-2013:1183-1
Rating:             moderate
References:         #815451 #821663 #821664 #821665 #821667 #821668 
                    #821669 #821670 #821671 #824294 
Cross-References:   CVE-2013-1981 CVE-2013-1982 CVE-2013-1983
                    CVE-2013-1984 CVE-2013-1985 CVE-2013-1987
                    CVE-2013-1988 CVE-2013-1989 CVE-2013-1990
                    CVE-2013-1991 CVE-2013-1992 CVE-2013-1995
                    CVE-2013-1996 CVE-2013-1997 CVE-2013-1998
                    CVE-2013-1999 CVE-2013-2000 CVE-2013-2001
                    CVE-2013-2002 CVE-2013-2003 CVE-2013-2004
                    CVE-2013-2005 CVE-2013-2062 CVE-2013-2063
                    CVE-2013-2066
Affected Products:
                    SUSE Linux Enterprise Server 10 SP4
                    SUSE Linux Enterprise Desktop 10 SP4
                    SLE SDK 10 SP4
______________________________________________________________________________

   An update that fixes 25 vulnerabilities is now available.

Description:


   This update of xorg-x11 fixes several security
   vulnerabilities.

   * Bug 815451- X.Org Security Advisory: May 23, 2013
   * Bug 821664 - libX11
   * Bug 821671 - libXv
   * Bug 821670 - libXt
   * Bug 821669 - libXrender
   * Bug 821668 - libXp
   * Bug 821667 - libXfixes
   * Bug 821665 - libXext
   * Bug 821663 - libFS, libXcursor, libXi, libXinerama,
   libXRes, libXtst, libXvMC, libXxf86dga, libXxf86vm, libdmx

   Security Issue references:

   * CVE-2013-1981
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981
   >
   * CVE-2013-1982
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1982
   >
   * CVE-2013-1983
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1983
   >
   * CVE-2013-1984
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984
   >
   * CVE-2013-1985
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1985
   >
   * CVE-2013-1987
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1987
   >
   * CVE-2013-1988
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1988
   >
   * CVE-2013-1989
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989
   >
   * CVE-2013-1990
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1990
   >
   * CVE-2013-1991
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1991
   >
   * CVE-2013-1992
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1992
   >
   * CVE-2013-1995
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995
   >
   * CVE-2013-1996
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1996
   >
   * CVE-2013-1997
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997
   >
   * CVE-2013-1998
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998
   >
   * CVE-2013-1999
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1999
   >
   * CVE-2013-2000
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2000
   >
   * CVE-2013-2001
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2001
   >
   * CVE-2013-2002
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002
   >
   * CVE-2013-2003
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2003
   >
   * CVE-2013-2004
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004
   >
   * CVE-2013-2005
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005
   >
   * CVE-2013-2062
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2062
   >
   * CVE-2013-2063
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2063
   >
   * CVE-2013-2066
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066
   >



Package List:

   - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64):

      xorg-x11-6.9.0-50.84.4
      xorg-x11-Xnest-6.9.0-50.84.4
      xorg-x11-Xvfb-6.9.0-50.84.4
      xorg-x11-Xvnc-6.9.0-50.84.4
      xorg-x11-devel-6.9.0-50.84.4
      xorg-x11-doc-6.9.0-50.84.4
      xorg-x11-fonts-100dpi-6.9.0-50.84.4
      xorg-x11-fonts-75dpi-6.9.0-50.84.4
      xorg-x11-fonts-cyrillic-6.9.0-50.84.4
      xorg-x11-fonts-scalable-6.9.0-50.84.4
      xorg-x11-fonts-syriac-6.9.0-50.84.4
      xorg-x11-libs-6.9.0-50.84.4
      xorg-x11-man-6.9.0-50.84.4

   - SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc x86_64):

      xorg-x11-sdk-6.9.0-50.84.4
      xorg-x11-server-6.9.0-50.84.4
      xorg-x11-server-glx-6.9.0-50.84.4

   - SUSE Linux Enterprise Server 10 SP4 (s390x x86_64):

      xorg-x11-devel-32bit-6.9.0-50.84.4
      xorg-x11-libs-32bit-6.9.0-50.84.4

   - SUSE Linux Enterprise Server 10 SP4 (ia64):

      xorg-x11-libs-x86-6.9.0-50.84.4

   - SUSE Linux Enterprise Server 10 SP4 (ppc):

      xorg-x11-devel-64bit-6.9.0-50.84.4
      xorg-x11-libs-64bit-6.9.0-50.84.4

   - SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64):

      xorg-x11-6.9.0-50.84.4
      xorg-x11-Xnest-6.9.0-50.84.4
      xorg-x11-Xvfb-6.9.0-50.84.4
      xorg-x11-Xvnc-6.9.0-50.84.4
      xorg-x11-devel-6.9.0-50.84.4
      xorg-x11-fonts-100dpi-6.9.0-50.84.4
      xorg-x11-fonts-75dpi-6.9.0-50.84.4
      xorg-x11-fonts-cyrillic-6.9.0-50.84.4
      xorg-x11-fonts-scalable-6.9.0-50.84.4
      xorg-x11-fonts-syriac-6.9.0-50.84.4
      xorg-x11-libs-6.9.0-50.84.4
      xorg-x11-man-6.9.0-50.84.4
      xorg-x11-server-6.9.0-50.84.4
      xorg-x11-server-glx-6.9.0-50.84.4

   - SUSE Linux Enterprise Desktop 10 SP4 (x86_64):

      xorg-x11-devel-32bit-6.9.0-50.84.4
      xorg-x11-libs-32bit-6.9.0-50.84.4

   - SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64):

      xorg-x11-Xvfb-6.9.0-50.84.4
      xorg-x11-doc-6.9.0-50.84.4

   - SLE SDK 10 SP4 (i586 ia64 ppc x86_64):

      xorg-x11-sdk-6.9.0-50.84.4


References:

   http://support.novell.com/security/cve/CVE-2013-1981.html
   http://support.novell.com/security/cve/CVE-2013-1982.html
   http://support.novell.com/security/cve/CVE-2013-1983.html
   http://support.novell.com/security/cve/CVE-2013-1984.html
   http://support.novell.com/security/cve/CVE-2013-1985.html
   http://support.novell.com/security/cve/CVE-2013-1987.html
   http://support.novell.com/security/cve/CVE-2013-1988.html
   http://support.novell.com/security/cve/CVE-2013-1989.html
   http://support.novell.com/security/cve/CVE-2013-1990.html
   http://support.novell.com/security/cve/CVE-2013-1991.html
   http://support.novell.com/security/cve/CVE-2013-1992.html
   http://support.novell.com/security/cve/CVE-2013-1995.html
   http://support.novell.com/security/cve/CVE-2013-1996.html
   http://support.novell.com/security/cve/CVE-2013-1997.html
   http://support.novell.com/security/cve/CVE-2013-1998.html
   http://support.novell.com/security/cve/CVE-2013-1999.html
   http://support.novell.com/security/cve/CVE-2013-2000.html
   http://support.novell.com/security/cve/CVE-2013-2001.html
   http://support.novell.com/security/cve/CVE-2013-2002.html
   http://support.novell.com/security/cve/CVE-2013-2003.html
   http://support.novell.com/security/cve/CVE-2013-2004.html
   http://support.novell.com/security/cve/CVE-2013-2005.html
   http://support.novell.com/security/cve/CVE-2013-2062.html
   http://support.novell.com/security/cve/CVE-2013-2063.html
   http://support.novell.com/security/cve/CVE-2013-2066.html
   https://bugzilla.novell.com/815451
   https://bugzilla.novell.com/821663
   https://bugzilla.novell.com/821664
   https://bugzilla.novell.com/821665
   https://bugzilla.novell.com/821667
   https://bugzilla.novell.com/821668
   https://bugzilla.novell.com/821669
   https://bugzilla.novell.com/821670
   https://bugzilla.novell.com/821671
   https://bugzilla.novell.com/824294
   http://download.novell.com/patch/finder/?keywords=0d0adbe855f0a576da72ba4a295c3364



More information about the sle-security-updates mailing list