Mailinglist Archive: opensuse-updates (200 mails)

< Previous Next >
openSUSE-SU-2013:1025-1: moderate: update for libXvMC
openSUSE Security Update: update for libXvMC
______________________________________________________________________________

Announcement ID: openSUSE-SU-2013:1025-1
Rating: moderate
References: #815451 #821663
Cross-References: CVE-2013-1990 CVE-2013-1999
Affected Products:
openSUSE 12.3
openSUSE 12.2
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update of libXvMC fixes several integer overflow
issues.
-
U_0001-integer-overflow-in-XvMCListSurfaceTypes-CVE-2013-19.
patch,
U_0002-integer-overflow-in-XvMCListSubpictureTypes-CVE-2013.
patch
* integer overflow in XvMCListSurfaceTypes(),
XvMCListSubpictureTypes() [CVE-2013-1990] (bnc#821663,
bnc#815451)
-
U_0001-Multiple-unvalidated-assumptions-in-XvMCGetDRInfo-CV.
patch
* Multiple unvalidated assumptions in XvMCGetDRInfo()
[CVE-2013-1999] (bnc#821663, bnc#815451)


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 12.3:

zypper in -t patch openSUSE-2013-508

- openSUSE 12.2:

zypper in -t patch openSUSE-2013-508

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 12.3 (i586 x86_64):

libXvMC-debugsource-1.0.7-4.4.1
libXvMC-devel-1.0.7-4.4.1
libXvMC1-1.0.7-4.4.1
libXvMC1-debuginfo-1.0.7-4.4.1

- openSUSE 12.3 (x86_64):

libXvMC-devel-32bit-1.0.7-4.4.1
libXvMC1-32bit-1.0.7-4.4.1
libXvMC1-debuginfo-32bit-1.0.7-4.4.1

- openSUSE 12.2 (i586 x86_64):

libXvMC-debugsource-1.0.7-2.4.1
libXvMC-devel-1.0.7-2.4.1
libXvMC1-1.0.7-2.4.1
libXvMC1-debuginfo-1.0.7-2.4.1

- openSUSE 12.2 (x86_64):

libXvMC-devel-32bit-1.0.7-2.4.1
libXvMC1-32bit-1.0.7-2.4.1
libXvMC1-debuginfo-32bit-1.0.7-2.4.1


References:

http://support.novell.com/security/cve/CVE-2013-1990.html
http://support.novell.com/security/cve/CVE-2013-1999.html
https://bugzilla.novell.com/815451
https://bugzilla.novell.com/821663


< Previous Next >
This Thread
  • No further messages