How to Buy
This script is Copyright (C) 2013 Tenable Network Security, Inc.
The remote Scientific Linux host is missing one or more security
A flaw was found in the way the X.org X11 server registered new hot
plugged devices. If a local user switched to a different session and
plugged in a new device, input from that device could become available
in the previous session, possibly leading to information disclosure.
This update also fixes the following bugs :
- A previous upstream patch modified the Xephyr X server
to be resizeable, however, it did not enable the resize
functionality by default. As a consequence, X sandboxes
were not resizeable on Scientific Linux 6.4 and later.
This update enables the resize functionality by default
so that X sandboxes can now be resized as expected.
- In Scientific Linux 6, the X Security extension
(XC-SECURITY) has been disabled and replaced by X Access
Control Extension (XACE). However, XACE does not yet
include functionality that was previously available in
XC- SECURITY. With this update, XC-SECURITY is enabled
in the xorg-x11-server spec file on Scientific Linux 6.
- Upstream code changes to extension initialization
accidentally disabled the GLX extension in Xvfb (the X
virtual frame buffer), rendering headless 3D
applications not functional. An upstream patch to this
problem has been backported so the GLX extension is
enabled again, and applications relying on this
extension work as expected.
See also :
Update the affected packages.
Risk factor :
Low / CVSS Base Score : 2.1
Family: Scientific Linux Local Security Checks
Nessus Plugin ID: 71302 ()
CVE ID: CVE-2013-1940
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.