Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.871082
Category:Red Hat Local Security Checks
Title:RedHat Update for xorg-x11-server RHSA-2013:1620-02
Summary:The remote host is missing an update for the 'xorg-x11-server'; package(s) announced via the referenced advisory.
Description:Summary:
The remote host is missing an update for the 'xorg-x11-server'
package(s) announced via the referenced advisory.

Vulnerability Insight:
X.Org is an open source implementation of the X Window System. It provides
the basic low-level functionality that full-fledged graphical user
interfaces are designed upon.

A flaw was found in the way the X.org X11 server registered new hot plugged
devices. If a local user switched to a different session and plugged in a
new device, input from that device could become available in the previous
session, possibly leading to information disclosure. (CVE-2013-1940)

This issue was found by David Airlie and Peter Hutterer of Red Hat.

This update also fixes the following bugs:

* A previous upstream patch modified the Xephyr X server to be resizable,
however, it did not enable the resize functionality by default. As a
consequence, X sandboxes were not resizable on Red Hat Enterprise Linux
6.4 and later. This update enables the resize functionality by default so
that X sandboxes can now be resized as expected. (BZ#915202)

* In Red Hat Enterprise Linux 6, the X Security extension (XC-SECURITY)
has been disabled and replaced by X Access Control Extension (XACE).
However, XACE does not yet include functionality that was previously
available in XC-SECURITY. With this update, XC-SECURITY is enabled in the
xorg-x11-server spec file on Red Hat Enterprise Linux 6. (BZ#957298)

* Upstream code changes to extension initialization accidentally disabled
the GLX extension in Xvfb (the X virtual frame buffer), rendering headless
3D applications not functional. An upstream patch to this problem has been
backported so the GLX extension is enabled again, and applications relying
on this extension work as expected. (BZ#969538)

All xorg-x11-server users are advised to upgrade to these updated packages,
which contain backported patches to correct these issues.

Affected Software/OS:
xorg-x11-server on Red Hat Enterprise Linux Desktop (v. 6),
Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)

Solution:
Please Install the Updated Packages.

CVSS Score:
2.1

CVSS Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2013-1940
Debian Security Information: DSA-2661 (Google Search)
http://www.debian.org/security/2013/dsa-2661
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/104089.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102391.html
http://www.openwall.com/lists/oss-security/2013/04/18/3
SuSE Security Announcement: openSUSE-SU-2013:0878 (Google Search)
http://lists.opensuse.org/opensuse-updates/2013-06/msg00015.html
http://www.ubuntu.com/usn/USN-1803-1
CopyrightCopyright (C) 2013 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2021 E-Soft Inc. All rights reserved.