SUSE-SU-2013:1103-1: moderate: Security update for xorg-x11-libs
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Fri Jun 28 10:04:22 MDT 2013
SUSE Security Update: Security update for xorg-x11-libs
______________________________________________________________________________
Announcement ID: SUSE-SU-2013:1103-1
Rating: moderate
References: #815451 #821663
Cross-References: CVE-2013-1984 CVE-2013-1985 CVE-2013-1986
CVE-2013-1988 CVE-2013-1990 CVE-2013-1991
CVE-2013-1992 CVE-2013-1995 CVE-2013-1996
CVE-2013-1998 CVE-2013-1999 CVE-2013-2000
CVE-2013-2001 CVE-2013-2003 CVE-2013-2063
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP2
SUSE Linux Enterprise Server 11 SP2 for VMware
SUSE Linux Enterprise Server 11 SP2
SUSE Linux Enterprise Desktop 11 SP2
______________________________________________________________________________
An update that fixes 15 vulnerabilities is now available.
Description:
This update of xorg-x11-libs fixes several integer and
buffer overflow issues (bnc#815451, bnc#821663).
Security Issue references:
* CVE-2013-1984
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984
>
* CVE-2013-1985
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1985
>
* CVE-2013-1986
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1986
>
* CVE-2013-1988
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1988
>
* CVE-2013-1990
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1990
>
* CVE-2013-1991
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1991
>
* CVE-2013-1992
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1992
>
* CVE-2013-1995
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995
>
* CVE-2013-1996
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1996
>
* CVE-2013-1998
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998
>
* CVE-2013-1999
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1999
>
* CVE-2013-2000
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2000
>
* CVE-2013-2001
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2001
>
* CVE-2013-2003
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2003
>
* CVE-2013-2063
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2063
>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11 SP2:
zypper in -t patch sdksp2-xorg-x11-devel-7846
- SUSE Linux Enterprise Server 11 SP2 for VMware:
zypper in -t patch slessp2-xorg-x11-devel-7846
- SUSE Linux Enterprise Server 11 SP2:
zypper in -t patch slessp2-xorg-x11-devel-7846
- SUSE Linux Enterprise Desktop 11 SP2:
zypper in -t patch sledsp2-xorg-x11-devel-7846
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64):
xorg-x11-devel-7.4-8.26.36.1
- SUSE Linux Enterprise Software Development Kit 11 SP2 (ppc64 s390x x86_64):
xorg-x11-devel-32bit-7.4-8.26.36.1
- SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64):
xorg-x11-libs-7.4-8.26.36.1
- SUSE Linux Enterprise Server 11 SP2 for VMware (x86_64):
xorg-x11-libs-32bit-7.4-8.26.36.1
- SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64):
xorg-x11-libs-7.4-8.26.36.1
- SUSE Linux Enterprise Server 11 SP2 (ppc64 s390x x86_64):
xorg-x11-libs-32bit-7.4-8.26.36.1
- SUSE Linux Enterprise Server 11 SP2 (ia64):
xorg-x11-libs-x86-7.4-8.26.36.1
- SUSE Linux Enterprise Desktop 11 SP2 (i586 x86_64):
xorg-x11-devel-7.4-8.26.36.1
xorg-x11-libs-7.4-8.26.36.1
- SUSE Linux Enterprise Desktop 11 SP2 (x86_64):
xorg-x11-libs-32bit-7.4-8.26.36.1
References:
http://support.novell.com/security/cve/CVE-2013-1984.html
http://support.novell.com/security/cve/CVE-2013-1985.html
http://support.novell.com/security/cve/CVE-2013-1986.html
http://support.novell.com/security/cve/CVE-2013-1988.html
http://support.novell.com/security/cve/CVE-2013-1990.html
http://support.novell.com/security/cve/CVE-2013-1991.html
http://support.novell.com/security/cve/CVE-2013-1992.html
http://support.novell.com/security/cve/CVE-2013-1995.html
http://support.novell.com/security/cve/CVE-2013-1996.html
http://support.novell.com/security/cve/CVE-2013-1998.html
http://support.novell.com/security/cve/CVE-2013-1999.html
http://support.novell.com/security/cve/CVE-2013-2000.html
http://support.novell.com/security/cve/CVE-2013-2001.html
http://support.novell.com/security/cve/CVE-2013-2003.html
http://support.novell.com/security/cve/CVE-2013-2063.html
https://bugzilla.novell.com/815451
https://bugzilla.novell.com/821663
http://download.novell.com/patch/finder/?keywords=2b0c37d1a8beb0af8c31c6e5efaa35d4
More information about the sle-security-updates
mailing list