![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.871082 |
Category: | Red Hat Local Security Checks |
Title: | RedHat Update for xorg-x11-server RHSA-2013:1620-02 |
Summary: | The remote host is missing an update for the 'xorg-x11-server'; package(s) announced via the referenced advisory. |
Description: | Summary: The remote host is missing an update for the 'xorg-x11-server' package(s) announced via the referenced advisory. Vulnerability Insight: X.Org is an open source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. A flaw was found in the way the X.org X11 server registered new hot plugged devices. If a local user switched to a different session and plugged in a new device, input from that device could become available in the previous session, possibly leading to information disclosure. (CVE-2013-1940) This issue was found by David Airlie and Peter Hutterer of Red Hat. This update also fixes the following bugs: * A previous upstream patch modified the Xephyr X server to be resizable, however, it did not enable the resize functionality by default. As a consequence, X sandboxes were not resizable on Red Hat Enterprise Linux 6.4 and later. This update enables the resize functionality by default so that X sandboxes can now be resized as expected. (BZ#915202) * In Red Hat Enterprise Linux 6, the X Security extension (XC-SECURITY) has been disabled and replaced by X Access Control Extension (XACE). However, XACE does not yet include functionality that was previously available in XC-SECURITY. With this update, XC-SECURITY is enabled in the xorg-x11-server spec file on Red Hat Enterprise Linux 6. (BZ#957298) * Upstream code changes to extension initialization accidentally disabled the GLX extension in Xvfb (the X virtual frame buffer), rendering headless 3D applications not functional. An upstream patch to this problem has been backported so the GLX extension is enabled again, and applications relying on this extension work as expected. (BZ#969538) All xorg-x11-server users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. Affected Software/OS: xorg-x11-server on Red Hat Enterprise Linux Desktop (v. 6), Red Hat Enterprise Linux Server (v. 6), Red Hat Enterprise Linux Workstation (v. 6) Solution: Please Install the Updated Packages. CVSS Score: 2.1 CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2013-1940 Debian Security Information: DSA-2661 (Google Search) http://www.debian.org/security/2013/dsa-2661 http://lists.fedoraproject.org/pipermail/package-announce/2013-April/104089.html http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102391.html http://www.openwall.com/lists/oss-security/2013/04/18/3 SuSE Security Announcement: openSUSE-SU-2013:0878 (Google Search) http://lists.opensuse.org/opensuse-updates/2013-06/msg00015.html http://www.ubuntu.com/usn/USN-1803-1 |
Copyright | Copyright (C) 2013 Greenbone AG |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |