Mailinglist Archive: opensuse-updates (200 mails)

< Previous Next >
openSUSE-SU-2013:1010-1: moderate: update for libXv
openSUSE Security Update: update for libXv
______________________________________________________________________________

Announcement ID: openSUSE-SU-2013:1010-1
Rating: moderate
References: #815451 #821671
Cross-References: CVE-2013-1989 CVE-2013-2066
Affected Products:
openSUSE 12.3
openSUSE 12.2
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update of libXrender fixes several buffer and integer
overflow issues.
-
U_0001-integer-overflow-in-XvQueryPortAttributes-CVE-2013-1.
patch,
U_0002-integer-overflow-in-XvListImageFormats-CVE-2013-1989.
patch,
U_0003-integer-overflow-in-XvCreateImage-CVE-2013-1989-3-3.p
atch
* integer overflow in XvQueryPortAttributes(),
XvListImageFormats(), XvCreateImage() [CVE-2013-1989]
(bnc#821671, bnc#815451)
-
U_0001-buffer-overflow-in-XvQueryPortAttributes-CVE-2013-20.
patch
* buffer overflow in XvQueryPortAttributes()
[CVE-2013-2066] (bnc#821671, bnc#815451)


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 12.3:

zypper in -t patch openSUSE-2013-491

- openSUSE 12.2:

zypper in -t patch openSUSE-2013-491

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 12.3 (i586 x86_64):

libXv-debugsource-1.0.7-4.4.1
libXv-devel-1.0.7-4.4.1
libXv1-1.0.7-4.4.1
libXv1-debuginfo-1.0.7-4.4.1

- openSUSE 12.3 (x86_64):

libXv-devel-32bit-1.0.7-4.4.1
libXv1-32bit-1.0.7-4.4.1
libXv1-debuginfo-32bit-1.0.7-4.4.1

- openSUSE 12.2 (i586 x86_64):

libXv-debugsource-1.0.7-2.4.1
libXv-devel-1.0.7-2.4.1
libXv1-1.0.7-2.4.1
libXv1-debuginfo-1.0.7-2.4.1

- openSUSE 12.2 (x86_64):

libXv-devel-32bit-1.0.7-2.4.1
libXv1-32bit-1.0.7-2.4.1
libXv1-debuginfo-32bit-1.0.7-2.4.1


References:

http://support.novell.com/security/cve/CVE-2013-1989.html
http://support.novell.com/security/cve/CVE-2013-2066.html
https://bugzilla.novell.com/815451
https://bugzilla.novell.com/821671


< Previous Next >
This Thread
  • No further messages