Important: xorg-x11-server

2014-09-16T22:19:00
ID ALAS-2014-277
Type amazon
Reporter Amazon
Modified 2014-09-16T22:19:00

Description

Issue Overview:

An integer overflow, which led to a heap-based buffer overflow, was found in the way X.Org server handled trapezoids. A malicious, authorized client could use this flaw to crash the X.Org server or, potentially, execute arbitrary code with root privileges. (CVE-2013-6424 __)

Affected Packages:

xorg-x11-server

Issue Correction:
Run yum update xorg-x11-server to update your system.

New Packages:

noarch:  
    xorg-x11-server-source-1.13.0-23.1.36.amzn1.noarch

src:  
    xorg-x11-server-1.13.0-23.1.36.amzn1.src

x86_64:  
    xorg-x11-server-devel-1.13.0-23.1.36.amzn1.x86_64  
    xorg-x11-server-Xephyr-1.13.0-23.1.36.amzn1.x86_64  
    xorg-x11-server-debuginfo-1.13.0-23.1.36.amzn1.x86_64  
    xorg-x11-server-common-1.13.0-23.1.36.amzn1.x86_64  
    xorg-x11-server-Xnest-1.13.0-23.1.36.amzn1.x86_64  
    xorg-x11-server-Xorg-1.13.0-23.1.36.amzn1.x86_64  
    xorg-x11-server-Xvfb-1.13.0-23.1.36.amzn1.x86_64  
    xorg-x11-server-Xdmx-1.13.0-23.1.36.amzn1.x86_64