Update X packages to address security issues.

See http://www.openwall.com/lists/oss-security/2013/05/23/3 for
discussion, basically this addresses potential overflows in the X11
client libraries which could be triggered by a rogue X server.

This change updates the following packages:

Update to libX11 1.6.0
 CVE-2013-1981
 CVE-2013-1997
 CVE-2013-2004

Update to libXcursor 1.1.14
 CVE-2013-2003

Update to libXext 1.3.2
 CVE-2013-1982

Update to libXfixes 5.0.1
 CVE-2013-1983

Update to libXi 1.7.1.901
 CVE-2013-1984
 CVE-2013-1995
 CVE-2013-1998

Update to libXinerama 1.1.3
 CVE-2013-1985

Update to libXrandr 1.4.1
 CVE-2013-1986

Update to libXrender 0.9.8
 CVE-2013-1987

Update to libXv 1.0.9
 CVE-2013-1989
 CVE-2013-2066

Update to libXvMC 1.0.8
 CVE-2013-1990
 CVE-2013-1999

Update to libXxf86vm 1.1.3
 CVE-2013-2001

Update to libxcb 1.9.1
 CVE-2013-2064

Update to libXt 1.1.4
 CVE-2013-2002
 CVE-2013-2005

Update to randrproto 1.4.0-r1

Update to inputproto 2.3

BUG=chromium:255523
TEST=run on lumpy and snow, trybots

Change-Id: Ibb21a9824f96e411ada3e7c743de0558f67304f0
Reviewed-on: https://gerrit.chromium.org/gerrit/60838
Commit-Queue: Stéphane Marchesin <marcheu@chromium.org>
Reviewed-by: Stéphane Marchesin <marcheu@chromium.org>
Tested-by: Stéphane Marchesin <marcheu@chromium.org>
44 files changed