openSUSE Security Update: xorg-x11-server: Fix multiple bugs and security
Announcement ID: openSUSE-SU-2010:0561-1
References: #546632 #597232 #618152 #623254 #625593
An update that solves one vulnerability and has four fixes
is now available.
The X.Org X11 Server was updated to fix several bugs and 2
Two security issues were fixed: CVE-2010-2240: This fix
adds a workaround for overlapping stacks and heaps in case
of OOM conditions.This workaround is necessary if the
kernel is not properly adding guard or gap-pages below the
CVE-2010-1166: The fbComposite function in fbpict.c in the
Render extension in the X server in X.Org X11R7.1 allows
remote authenticated users to cause a denial of service
(memory corruption and daemon crash) or possibly execute
arbitrary code via a crafted request, related to an
incorrect macro definition.
Non-Security Bugs fixed: Fix some shortcomings in the Xdmcp
implementation. It used to suppress loopback addresses from
the list of potential display addresses to report to xdm,
even when talking to xdm through a loopback address. Now
only display addresses of the same kind as the xdm
connection are reported to xdm.
This most notably helps Xvnc servers contacting the local
xdm, because they were severely affected by the
suppression of loopback addresses.
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.3:
zypper in -t patch xorg-x11-Xvnc-2973
To bring your system up-to-date, use "zypper patch".
- openSUSE 11.3 (i586 x86_64):