|Category:||SuSE Local Security Checks|
|Title:||SUSE: Security Advisory (SUSE-SU-2013:0859-1)|
|Summary:||The remote host is missing an update for the 'Xorg' package(s) announced via the SUSE-SU-2013:0859-1 advisory.|
The remote host is missing an update for the 'Xorg' package(s) announced via the SUSE-SU-2013:0859-1 advisory.
This update of xorg-x11-server fixes one security issue and two bugs.
In some cases, input events are sent to X servers not currently the VT owner, allowing a user to capture passwords. (CVE-2013-1940)
Also the following bugs have been fixed:
* A memory leak in cursor handling could slowly run the X server out of memory. (bnc#813178)
* A memory leak in the X GE extension has been fixed that could have also run the X server out of memory
* A CAPS lock issue in VNC has been fixed (bnc#787170)
Security Issue reference:
'Xorg' package(s) on SUSE Linux Enterprise Software Development Kit 11 SP2, SUSE Linux Enterprise Server 11 SP2, SUSE Linux Enterprise Desktop 11 SP2
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2013-1940|
Debian Security Information: DSA-2661 (Google Search)
SuSE Security Announcement: openSUSE-SU-2013:0878 (Google Search)
|Copyright||Copyright (C) 2021 Greenbone Networks GmbH|
|This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.