Security update for xorg-x11
SUSE Security Update: Security update for xorg-x11
This update of xorg-x11 fixes several security
vulnerabilities.
* Bug 815451- X.Org Security Advisory: May 23, 2013
* Bug 821664 - libX11
* Bug 821671 - libXv
* Bug 821670 - libXt
* Bug 821669 - libXrender
* Bug 821668 - libXp
* Bug 821667 - libXfixes
* Bug 821665 - libXext
* Bug 821663 - libFS, libXcursor, libXi, libXinerama,
libXRes, libXtst, libXvMC, libXxf86dga, libXxf86vm, libdmx
Security Issue references:
* CVE-2013-1981
>
* CVE-2013-1982
>
* CVE-2013-1983
>
* CVE-2013-1984
>
* CVE-2013-1985
>
* CVE-2013-1987
>
* CVE-2013-1988
>
* CVE-2013-1989
>
* CVE-2013-1990
>
* CVE-2013-1991
>
* CVE-2013-1992
>
* CVE-2013-1995
>
* CVE-2013-1996
>
* CVE-2013-1997
>
* CVE-2013-1998
>
* CVE-2013-1999
>
* CVE-2013-2000
>
* CVE-2013-2001
>
* CVE-2013-2002
>
* CVE-2013-2003
>
* CVE-2013-2004
>
* CVE-2013-2005
>
* CVE-2013-2062
>
* CVE-2013-2063
>
* CVE-2013-2066
>
Announcement ID: | SUSE-SU-2013:1183-1 |
Rating: | moderate |
References: | #815451 #821663 #821664 #821665 #821667 #821668 #821669 #821670 #821671 #824294 |
Affected Products: |
An update that fixes 25 vulnerabilities is now available.
Description:
This update of xorg-x11 fixes several security
vulnerabilities.
* Bug 815451- X.Org Security Advisory: May 23, 2013
* Bug 821664 - libX11
* Bug 821671 - libXv
* Bug 821670 - libXt
* Bug 821669 - libXrender
* Bug 821668 - libXp
* Bug 821667 - libXfixes
* Bug 821665 - libXext
* Bug 821663 - libFS, libXcursor, libXi, libXinerama,
libXRes, libXtst, libXvMC, libXxf86dga, libXxf86vm, libdmx
Security Issue references:
* CVE-2013-1981
* CVE-2013-1982
* CVE-2013-1983
* CVE-2013-1984
* CVE-2013-1985
* CVE-2013-1987
* CVE-2013-1988
* CVE-2013-1989
* CVE-2013-1990
* CVE-2013-1991
* CVE-2013-1992
* CVE-2013-1995
* CVE-2013-1996
* CVE-2013-1997
* CVE-2013-1998
* CVE-2013-1999
* CVE-2013-2000
* CVE-2013-2001
* CVE-2013-2002
* CVE-2013-2003
* CVE-2013-2004
* CVE-2013-2005
* CVE-2013-2062
* CVE-2013-2063
* CVE-2013-2066
Package List:
- SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc s390x x86_64):
- xorg-x11-6.9.0-50.84.4
- xorg-x11-Xnest-6.9.0-50.84.4
- xorg-x11-Xvfb-6.9.0-50.84.4
- xorg-x11-Xvnc-6.9.0-50.84.4
- xorg-x11-devel-6.9.0-50.84.4
- xorg-x11-doc-6.9.0-50.84.4
- xorg-x11-fonts-100dpi-6.9.0-50.84.4
- xorg-x11-fonts-75dpi-6.9.0-50.84.4
- xorg-x11-fonts-cyrillic-6.9.0-50.84.4
- xorg-x11-fonts-scalable-6.9.0-50.84.4
- xorg-x11-fonts-syriac-6.9.0-50.84.4
- xorg-x11-libs-6.9.0-50.84.4
- xorg-x11-man-6.9.0-50.84.4
- SUSE Linux Enterprise Server 10 SP4 (i586 ia64 ppc x86_64):
- xorg-x11-sdk-6.9.0-50.84.4
- xorg-x11-server-6.9.0-50.84.4
- xorg-x11-server-glx-6.9.0-50.84.4
- SUSE Linux Enterprise Server 10 SP4 (s390x x86_64):
- xorg-x11-devel-32bit-6.9.0-50.84.4
- xorg-x11-libs-32bit-6.9.0-50.84.4
- SUSE Linux Enterprise Server 10 SP4 (ia64):
- xorg-x11-libs-x86-6.9.0-50.84.4
- SUSE Linux Enterprise Server 10 SP4 (ppc):
- xorg-x11-devel-64bit-6.9.0-50.84.4
- xorg-x11-libs-64bit-6.9.0-50.84.4
- SUSE Linux Enterprise Desktop 10 SP4 (i586 x86_64):
- xorg-x11-6.9.0-50.84.4
- xorg-x11-Xnest-6.9.0-50.84.4
- xorg-x11-Xvfb-6.9.0-50.84.4
- xorg-x11-Xvnc-6.9.0-50.84.4
- xorg-x11-devel-6.9.0-50.84.4
- xorg-x11-fonts-100dpi-6.9.0-50.84.4
- xorg-x11-fonts-75dpi-6.9.0-50.84.4
- xorg-x11-fonts-cyrillic-6.9.0-50.84.4
- xorg-x11-fonts-scalable-6.9.0-50.84.4
- xorg-x11-fonts-syriac-6.9.0-50.84.4
- xorg-x11-libs-6.9.0-50.84.4
- xorg-x11-man-6.9.0-50.84.4
- xorg-x11-server-6.9.0-50.84.4
- xorg-x11-server-glx-6.9.0-50.84.4
- SUSE Linux Enterprise Desktop 10 SP4 (x86_64):
- xorg-x11-devel-32bit-6.9.0-50.84.4
- xorg-x11-libs-32bit-6.9.0-50.84.4
- SLE SDK 10 SP4 (i586 ia64 ppc s390x x86_64):
- xorg-x11-Xvfb-6.9.0-50.84.4
- xorg-x11-doc-6.9.0-50.84.4
- SLE SDK 10 SP4 (i586 ia64 ppc x86_64):
- xorg-x11-sdk-6.9.0-50.84.4
References:
- http://support.novell.com/security/cve/CVE-2013-1981.html
- http://support.novell.com/security/cve/CVE-2013-1982.html
- http://support.novell.com/security/cve/CVE-2013-1983.html
- http://support.novell.com/security/cve/CVE-2013-1984.html
- http://support.novell.com/security/cve/CVE-2013-1985.html
- http://support.novell.com/security/cve/CVE-2013-1987.html
- http://support.novell.com/security/cve/CVE-2013-1988.html
- http://support.novell.com/security/cve/CVE-2013-1989.html
- http://support.novell.com/security/cve/CVE-2013-1990.html
- http://support.novell.com/security/cve/CVE-2013-1991.html
- http://support.novell.com/security/cve/CVE-2013-1992.html
- http://support.novell.com/security/cve/CVE-2013-1995.html
- http://support.novell.com/security/cve/CVE-2013-1996.html
- http://support.novell.com/security/cve/CVE-2013-1997.html
- http://support.novell.com/security/cve/CVE-2013-1998.html
- http://support.novell.com/security/cve/CVE-2013-1999.html
- http://support.novell.com/security/cve/CVE-2013-2000.html
- http://support.novell.com/security/cve/CVE-2013-2001.html
- http://support.novell.com/security/cve/CVE-2013-2002.html
- http://support.novell.com/security/cve/CVE-2013-2003.html
- http://support.novell.com/security/cve/CVE-2013-2004.html
- http://support.novell.com/security/cve/CVE-2013-2005.html
- http://support.novell.com/security/cve/CVE-2013-2062.html
- http://support.novell.com/security/cve/CVE-2013-2063.html
- http://support.novell.com/security/cve/CVE-2013-2066.html
- https://bugzilla.novell.com/815451
- https://bugzilla.novell.com/821663
- https://bugzilla.novell.com/821664
- https://bugzilla.novell.com/821665
- https://bugzilla.novell.com/821667
- https://bugzilla.novell.com/821668
- https://bugzilla.novell.com/821669
- https://bugzilla.novell.com/821670
- https://bugzilla.novell.com/821671
- https://bugzilla.novell.com/824294
- http://download.suse.com/patch/finder/?keywords=0d0adbe855f0a576da72ba4a295c3364