Mailinglist Archive: opensuse-updates (72 mails)

< Previous Next >
openSUSE-SU-2010:0561-1 (moderate): xorg-x11-server: Fix multiple bugs and security vulnerabilities
  • From: opensuse-security@xxxxxxxxxxxx
  • Date: Mon, 30 Aug 2010 18:08:11 +0200 (CEST)
  • Message-id: <20100830160811.A2AE1BE29@xxxxxxxxxxxxxx>
openSUSE Security Update: xorg-x11-server: Fix multiple bugs and security

Announcement ID: openSUSE-SU-2010:0561-1
Rating: moderate
References: #546632 #597232 #618152 #623254 #625593
Cross-References: CVE-2010-2240
Affected Products:
openSUSE 11.3

An update that solves one vulnerability and has four fixes
is now available.


The X.Org X11 Server was updated to fix several bugs and 2
security issues:

Two security issues were fixed: CVE-2010-2240: This fix
adds a workaround for overlapping stacks and heaps in case
of OOM conditions.This workaround is necessary if the
kernel is not properly adding guard or gap-pages below the

CVE-2010-1166: The fbComposite function in fbpict.c in the
Render extension in the X server in X.Org X11R7.1 allows
remote authenticated users to cause a denial of service
(memory corruption and daemon crash) or possibly execute
arbitrary code via a crafted request, related to an
incorrect macro definition.

Non-Security Bugs fixed: Fix some shortcomings in the Xdmcp
implementation. It used to suppress loopback addresses from
the list of potential display addresses to report to xdm,
even when talking to xdm through a loopback address. Now
only display addresses of the same kind as the xdm
connection are reported to xdm.

This most notably helps Xvnc servers contacting the local
xdm, because they were severely affected by the
suppression of loopback addresses.

Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 11.3:

zypper in -t patch xorg-x11-Xvnc-2973

To bring your system up-to-date, use "zypper patch".

Package List:

- openSUSE 11.3 (i586 x86_64):



< Previous Next >
This Thread
  • No further messages