openSUSE Security Update: update for xorg-x11-server ______________________________________________________________________________ Announcement ID: openSUSE-SU-2013:1614-1 Rating: moderate References: #816813 #843652 Cross-References: CVE-2013-4396 Affected Products: openSUSE 11.4 ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: Fixes the following security issue: - an authenticated X client can cause an X server to use memory after it was freed, potentially leading to crash and/or memory corruption. (CVE-2013-4396, bnc#843652) and the following bug was fixed too: - rfbAuthReenable is accessing rfbClient structure that was in most cases already freed. It actually needs only ScreenPtr, so pass it directly. (bnc#816813) Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 11.4: zypper in -t patch 2013-153 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 11.4 (i586 x86_64): xorg-x11-Xvnc-7.6_1.9.3-15.44.1 xorg-x11-Xvnc-debuginfo-7.6_1.9.3-15.44.1 xorg-x11-server-7.6_1.9.3-15.44.1 xorg-x11-server-debuginfo-7.6_1.9.3-15.44.1 xorg-x11-server-debugsource-7.6_1.9.3-15.44.1 xorg-x11-server-extra-7.6_1.9.3-15.44.1 xorg-x11-server-extra-debuginfo-7.6_1.9.3-15.44.1 xorg-x11-server-sdk-7.6_1.9.3-15.44.1 References: http://support.novell.com/security/cve/CVE-2013-4396.html https://bugzilla.novell.com/816813 https://bugzilla.novell.com/843652