Scientific Linux Security Update : xorg-x11-server on SL6.x i386/x86_64

Low Nessus Plugin ID 71302


The remote Scientific Linux host is missing one or more security updates.


A flaw was found in the way the X11 server registered new hot plugged devices. If a local user switched to a different session and plugged in a new device, input from that device could become available in the previous session, possibly leading to information disclosure.

This update also fixes the following bugs :

- A previous upstream patch modified the Xephyr X server to be resizeable, however, it did not enable the resize functionality by default. As a consequence, X sandboxes were not resizeable on Scientific Linux 6.4 and later.
This update enables the resize functionality by default so that X sandboxes can now be resized as expected.

- In Scientific Linux 6, the X Security extension (XC-SECURITY) has been disabled and replaced by X Access Control Extension (XACE). However, XACE does not yet include functionality that was previously available in XC- SECURITY. With this update, XC-SECURITY is enabled in the xorg-x11-server spec file on Scientific Linux 6.

- Upstream code changes to extension initialization accidentally disabled the GLX extension in Xvfb (the X virtual frame buffer), rendering headless 3D applications not functional. An upstream patch to this problem has been backported so the GLX extension is enabled again, and applications relying on this extension work as expected.


Update the affected packages.

See Also

Plugin Details

Severity: Low

ID: 71302

File Name: sl_20131121_xorg_x11_server_on_SL6_x.nasl

Version: $Revision: 1.1 $

Type: local

Agent: unix

Published: 2013/12/10

Modified: 2013/12/10

Dependencies: 12634

Risk Information

Risk Factor: Low


Base Score: 2.1

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2013/11/21

Reference Information

CVE: CVE-2013-1940