Low CentOS xorg-x11-server Update

Metadata

low
2.1
xorg-x11-server-1.13.0-23.el6.centos.src.rpm, xorg-x11-server-Xdmx-1.13.0-23.el6.centos.i686.rpm, xorg-x11-server-Xdmx-1.13.0-23.el6.centos.x86_64.rpm, xorg-x11-server-Xephyr-1.13.0-23.el6.centos.i686.rpm, xorg-x11-server-Xephyr-1.13.0-23.el6.centos.x86_64.rpm, xorg-x11-server-Xnest-1.13.0-23.el6.centos.i686.rpm, xorg-x11-server-Xnest-1.13.0-23.el6.centos.x86_64.rpm, xorg-x11-server-Xorg-1.13.0-23.el6.centos.i686.rpm, xorg-x11-server-Xorg-1.13.0-23.el6.centos.x86_64.rpm, xorg-x11-server-Xvfb-1.13.0-23.el6.centos.i686.rpm, xorg-x11-server-Xvfb-1.13.0-23.el6.centos.x86_64.rpm, xorg-x11-server-common-1.13.0-23.el6.centos.i686.rpm, xorg-x11-server-common-1.13.0-23.el6.centos.x86_64.rpm, xorg-x11-server-devel-1.13.0-23.el6.centos.i686.rpm, xorg-x11-server-devel-1.13.0-23.el6.centos.x86_64.rpm, xorg-x11-server-source-1.13.0-23.el6.centos.noarch.rpm
CVE-2013-1940
rhn.redhat.com, lists.centos.org
2013-11-26
2017-07-27 19:06
ALAS-2013-260
CVE-2013-1940 xorg-server
CVE-2013-1940
2017-04-01 19:07
2017-01-05 20:11

Description


Updated xorg-x11-server packages that fix one security issue and several
bugs are now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having low
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

X.Org is an open source implementation of the X Window System. It provides
the basic low-level functionality that full-fledged graphical user
interfaces are designed upon.

A flaw was found in the way the X.org X11 server registered new hot plugged
devices. If a local user switched to a different session and plugged in a
new device, input from that device could become available in the previous
session, possibly leading to information disclosure. (CVE-2013-1940)

This issue was found by David Airlie and Peter Hutterer of Red Hat.

This update also fixes the following bugs:

* A previous upstream patch modified the Xephyr X server to be resizeable,
however, it did not enable the resize functionality by default. As a
consequence, X sandboxes were not resizeable on Red Hat Enterprise Linux
6.4 and later. This update enables the resize functionality by default so
that X sandboxes can now be resized as expected. (BZ#915202)

* In Red Hat Enterprise Linux 6, the X Security extension (XC-SECURITY)
has been disabled and replaced by X Access Control Extension (XACE).
However, XACE does not yet include functionality that was previously
available in XC-SECURITY. With this update, XC-SECURITY is enabled in the
xorg-x11-server spec file on Red Hat Enterprise Linux 6. (BZ#957298)

* Upstream code changes to extension initialization accidentally disabled
the GLX extension in Xvfb (the X virtual frame buffer), rendering headless
3D applications not functional. An upstream patch to this problem has been
backported so the GLX extension is enabled again, and applications relying
on this extension work as expected. (BZ#969538)

All xorg-x11-server users are advised to upgrade to these updated packages,
which contain backported patches to correct these issues.
Please see https://www.redhat.com/footer/terms-of-use.html

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
6 xorg-x11-server xorg-x11-server-1.13.0-23.el6.centos.src.rpm
xorg-x11-server-common xorg-x11-server-common-1.13.0-23.el6.centos.i686.rpm
xorg-x11-server-common xorg-x11-server-common-1.13.0-23.el6.centos.x86_64.rpm
xorg-x11-server-devel xorg-x11-server-devel-1.13.0-23.el6.centos.x86_64.rpm
xorg-x11-server-devel xorg-x11-server-devel-1.13.0-23.el6.centos.i686.rpm
xorg-x11-server-source xorg-x11-server-source-1.13.0-23.el6.centos.noarch.rpm
xorg-x11-server-Xdmx xorg-x11-server-Xdmx-1.13.0-23.el6.centos.i686.rpm
xorg-x11-server-Xdmx xorg-x11-server-Xdmx-1.13.0-23.el6.centos.x86_64.rpm
xorg-x11-server-Xephyr xorg-x11-server-Xephyr-1.13.0-23.el6.centos.x86_64.rpm
xorg-x11-server-Xephyr xorg-x11-server-Xephyr-1.13.0-23.el6.centos.i686.rpm
xorg-x11-server-Xnest xorg-x11-server-Xnest-1.13.0-23.el6.centos.i686.rpm
xorg-x11-server-Xnest xorg-x11-server-Xnest-1.13.0-23.el6.centos.x86_64.rpm
xorg-x11-server-Xorg xorg-x11-server-Xorg-1.13.0-23.el6.centos.x86_64.rpm
xorg-x11-server-Xorg xorg-x11-server-Xorg-1.13.0-23.el6.centos.i686.rpm
xorg-x11-server-Xvfb xorg-x11-server-Xvfb-1.13.0-23.el6.centos.x86_64.rpm
xorg-x11-server-Xvfb xorg-x11-server-Xvfb-1.13.0-23.el6.centos.i686.rpm