Scientific Linux Security Update : xorg-x11-server on SL6.x i386/x86_64 (20131121)

low Nessus Plugin ID 71302
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote Scientific Linux host is missing one or more security updates.


A flaw was found in the way the X11 server registered new hot plugged devices. If a local user switched to a different session and plugged in a new device, input from that device could become available in the previous session, possibly leading to information disclosure.

This update also fixes the following bugs :

- A previous upstream patch modified the Xephyr X server to be resizeable, however, it did not enable the resize functionality by default. As a consequence, X sandboxes were not resizeable on Scientific Linux 6.4 and later.
This update enables the resize functionality by default so that X sandboxes can now be resized as expected.

- In Scientific Linux 6, the X Security extension (XC-SECURITY) has been disabled and replaced by X Access Control Extension (XACE). However, XACE does not yet include functionality that was previously available in XC- SECURITY. With this update, XC-SECURITY is enabled in the xorg-x11-server spec file on Scientific Linux 6.

- Upstream code changes to extension initialization accidentally disabled the GLX extension in Xvfb (the X virtual frame buffer), rendering headless 3D applications not functional. An upstream patch to this problem has been backported so the GLX extension is enabled again, and applications relying on this extension work as expected.


Update the affected packages.

See Also

Plugin Details

Severity: Low

ID: 71302

File Name: sl_20131121_xorg_x11_server_on_SL6_x.nasl

Version: 1.5

Type: local

Agent: unix

Published: 12/10/2013

Updated: 1/14/2021

Dependencies: ssh_get_info.nasl

Risk Information


Risk Factor: Medium

Score: 4.2


Risk Factor: Low

Base Score: 2.1

Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:fermilab:scientific_linux:xorg-x11-server-Xdmx, p-cpe:/a:fermilab:scientific_linux:xorg-x11-server-Xephyr, p-cpe:/a:fermilab:scientific_linux:xorg-x11-server-Xnest, p-cpe:/a:fermilab:scientific_linux:xorg-x11-server-Xorg, p-cpe:/a:fermilab:scientific_linux:xorg-x11-server-Xvfb, p-cpe:/a:fermilab:scientific_linux:xorg-x11-server-common, p-cpe:/a:fermilab:scientific_linux:xorg-x11-server-debuginfo, p-cpe:/a:fermilab:scientific_linux:xorg-x11-server-devel, p-cpe:/a:fermilab:scientific_linux:xorg-x11-server-source, x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 11/21/2013

Vulnerability Publication Date: 5/13/2013

Reference Information

CVE: CVE-2013-1940