SUSE-SU-2014:0881-1: moderate: Security update for xorg-x11-libs

sle-updates at lists.suse.com sle-updates at lists.suse.com
Wed Jul 9 12:04:13 MDT 2014


   SUSE Security Update: Security update for xorg-x11-libs
______________________________________________________________________________

Announcement ID:    SUSE-SU-2014:0881-1
Rating:             moderate
References:         #815451 #821663 #854915 #857544 
Cross-References:   CVE-2013-1984 CVE-2013-1985 CVE-2013-1986
                    CVE-2013-1988 CVE-2013-1990 CVE-2013-1991
                    CVE-2013-1992 CVE-2013-1995 CVE-2013-1996
                    CVE-2013-1998 CVE-2013-1999 CVE-2013-2000
                    CVE-2013-2001 CVE-2013-2003 CVE-2013-2063
                    CVE-2013-6462 CVE-2014-0209 CVE-2014-0210
                    CVE-2014-0211
Affected Products:
                    SUSE Linux Enterprise Server 11 SP1 LTSS
______________________________________________________________________________

   An update that fixes 19 vulnerabilities is now available.

Description:


   This is a SUSE Linux Enterprise Server 11 SP1 LTSS roll up update of
   xorg-x11-libs, fixing security issues and some bugs.

   These issues require connection to a malicious X server to trigger the
   bugs in client libraries.

   Security issues fixed:

       * CVE-2013-1984: Multiple integer overflows in X.org libXi allowed X
         servers to trigger allocation of insufficient memory and a buffer
         overflow via vectors related to the (1) XGetDeviceControl, (2)
   XGetFeedbackControl, (3) XGetDeviceDontPropagateList, (4)
   XGetDeviceMotionEvents, (5) XIGetProperty, (6) XIGetSelectedEvents, (7)
   XGetDeviceProperties, and (8) XListInputDevices functions.
       * CVE-2013-1985: Integer overflow in X.org libXinerama allowed X
         servers to trigger allocation of insufficient memory and a buffer
         overflow via vectors related to the XineramaQueryScreens function.
       * CVE-2013-1986: Multiple integer overflows in X.org libXrandr allowed
         X servers to trigger allocation of insufficient memory and a buffer
         overflow via vectors related to the (1) XRRQueryOutputProperty and
   (2) XRRQueryProviderProperty functions.
       * CVE-2013-1988: Multiple integer overflows in X.org libXRes allowed X
         servers to trigger allocation of insufficient memory and a buffer
         overflow via vectors related to the (1) XResQueryClients and (2)
   XResQueryClientResources functions.
       * CVE-2013-1990: Multiple integer overflows in X.org libXvMC allowed X
         servers to trigger allocation of insufficient memory and a buffer
         overflow via vectors related to the (1) XvMCListSurfaceTypes and (2)
   XvMCListSubpictureTypes functions.
       * CVE-2013-1991: Multiple integer overflows in X.org libXxf86dga
         allowed X servers to trigger allocation of insufficient memory and a
         buffer overflow via vectors related to the (1) XDGAQueryModes and
         (2) XDGASetMode functions.
       * CVE-2013-1992: Multiple integer overflows in X.org libdmx allowed X
         servers to trigger allocation of insufficient memory and a buffer
         overflow via vectors related to the (1) DMXGetScreenAttributes, (2)
   DMXGetWindowAttributes, and (3) DMXGetInputAttributes functions.
       * CVE-2013-1995: X.org libXi allowed X servers to trigger allocation
         of insufficient memory and a buffer overflow via vectors related to
         an unexpected sign extension in the XListInputDevices function.
       * CVE-2013-1996: X.org libFS allowed X servers to trigger allocation
         of insufficient memory and a buffer overflow via vectors related to
         an unexpected sign extension in the FSOpenServer function.
       * CVE-2013-1998: Multiple buffer overflows in X.org libXi allowed X
         servers to cause a denial of service (crash) and possibly execute
         arbitrary code via crafted length or index values to the (1)
         XGetDeviceButtonMapping, (2) XIPassiveGrabDevice, and (3)
         XQueryDeviceState functions.
       * CVE-2013-1999: Buffer overflow in X.org libXvMC allowed X servers to
         cause a denial of service (crash) and possibly execute arbitrary
         code via crafted length or index values to the XvMCGetDRInfo
         function.
       * CVE-2013-2000: Multiple buffer overflows in X.org libXxf86dga
         allowed X servers to cause a denial of service (crash) and possibly
         execute arbitrary code via crafted length or index values to the (1)
         XDGAQueryModes and (2) XDGASetMode functions.
       * CVE-2013-2001: Buffer overflow in X.org libXxf86vm allowed X servers
         to cause a denial of service (crash) and possibly execute arbitrary
         code via crafted length or index values to the
         XF86VidModeGetGammaRamp function.
       * CVE-2013-2003: Integer overflow in X.org libXcursor allowed X
         servers to trigger allocation of insufficient memory and a buffer
         overflow via vectors related to the _XcursorFileHeaderCreate
         function.
       * CVE-2013-2063: Integer overflow in X.org libXtst allowed X servers
         to trigger allocation of insufficient memory and a buffer overflow
         via vectors related to the XRecordGetContext function.
       * CVE-2013-6462: Stack-based buffer overflow in the bdfReadCharacters
         function in bitmap/bdfread.c in X.Org libXfont allowed remote
         attackers to cause a denial of service (crash) or possibly execute
         arbitrary code via a long string in a character name in a BDF font
         file.
       * CVE-2014-0209: Multiple integer overflows in the (1)
         FontFileAddEntry and (2) lexAlias functions in X.Org libXfont might
         have allowed local users to gain privileges by adding a directory
         with a large fonts.dir
         or fonts.alias file to the font path, which triggers a heap-based
   buffer overflow, related to metadata.
       * CVE-2014-0210: Multiple buffer overflows in X.Org libXfont allowed
         remote font servers to execute arbitrary code via a crafted xfs
         protocol reply to the (1) _fs_recv_conn_setup, (2)
         fs_read_open_font, (3) fs_read_query_info, (4) fs_read_extent_info,
         (5) fs_read_glyphs, (6) fs_read_list, or (7) fs_read_list_info
         function.
       * CVE-2014-0211: Multiple integer overflows in the (1) fs_get_reply,
         (2) fs_alloc_glyphs, and (3) fs_read_extent_info functions in X.Org
         libXfont allowed remote font servers to execute arbitrary code via a
         crafted xfs reply, which triggers a buffer overflow.

   Additionally, one non-security issue has been fixed:

       * XListDev: String size is unsigned char: Make char pointer to the
         device name & device name len unsigned otherwise we will segfault on
         device names > 128 characters.

   Security Issues references:

       * CVE-2013-1984
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984>
       * CVE-2013-1985
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1985>
       * CVE-2013-1986
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1986>
       * CVE-2013-1988
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1988>
       * CVE-2013-1990
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1990>
       * CVE-2013-1991
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1991>
       * CVE-2013-1992
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1992>
       * CVE-2013-1995
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995>
       * CVE-2013-1996
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1996>
       * CVE-2013-1998
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998>
       * CVE-2013-1999
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1999>
       * CVE-2013-2000
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2000>
       * CVE-2013-2001
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2001>
       * CVE-2013-2003
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2003>
       * CVE-2013-2063
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2063>
       * CVE-2013-6462
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6462>
       * CVE-2014-0209
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0209>
       * CVE-2014-0210
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0210>
       * CVE-2014-0211
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0211>


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 11 SP1 LTSS:

      zypper in -t patch slessp1-xorg-x11-devel-9391

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64):

      xorg-x11-libs-7.4-8.26.42.4

   - SUSE Linux Enterprise Server 11 SP1 LTSS (s390x x86_64):

      xorg-x11-libs-32bit-7.4-8.26.42.4


References:

   http://support.novell.com/security/cve/CVE-2013-1984.html
   http://support.novell.com/security/cve/CVE-2013-1985.html
   http://support.novell.com/security/cve/CVE-2013-1986.html
   http://support.novell.com/security/cve/CVE-2013-1988.html
   http://support.novell.com/security/cve/CVE-2013-1990.html
   http://support.novell.com/security/cve/CVE-2013-1991.html
   http://support.novell.com/security/cve/CVE-2013-1992.html
   http://support.novell.com/security/cve/CVE-2013-1995.html
   http://support.novell.com/security/cve/CVE-2013-1996.html
   http://support.novell.com/security/cve/CVE-2013-1998.html
   http://support.novell.com/security/cve/CVE-2013-1999.html
   http://support.novell.com/security/cve/CVE-2013-2000.html
   http://support.novell.com/security/cve/CVE-2013-2001.html
   http://support.novell.com/security/cve/CVE-2013-2003.html
   http://support.novell.com/security/cve/CVE-2013-2063.html
   http://support.novell.com/security/cve/CVE-2013-6462.html
   http://support.novell.com/security/cve/CVE-2014-0209.html
   http://support.novell.com/security/cve/CVE-2014-0210.html
   http://support.novell.com/security/cve/CVE-2014-0211.html
   https://bugzilla.novell.com/815451
   https://bugzilla.novell.com/821663
   https://bugzilla.novell.com/854915
   https://bugzilla.novell.com/857544
   http://download.suse.com/patch/finder/?keywords=f7b66bb8d10aeae2b91fccd0d169c8f3



More information about the sle-updates mailing list