Update X packages to address security issues.
See http://www.openwall.com/lists/oss-security/2013/05/23/3 for
discussion, basically this addresses potential overflows in the X11
client libraries which could be triggered by a rogue X server.
This change updates the following packages:
Update to libX11 1.6.0
CVE-2013-1981
CVE-2013-1997
CVE-2013-2004
Update to libXcursor 1.1.14
CVE-2013-2003
Update to libXext 1.3.2
CVE-2013-1982
Update to libXfixes 5.0.1
CVE-2013-1983
Update to libXi 1.7.1.901
CVE-2013-1984
CVE-2013-1995
CVE-2013-1998
Update to libXinerama 1.1.3
CVE-2013-1985
Update to libXrandr 1.4.1
CVE-2013-1986
Update to libXrender 0.9.8
CVE-2013-1987
Update to libXv 1.0.9
CVE-2013-1989
CVE-2013-2066
Update to libXvMC 1.0.8
CVE-2013-1990
CVE-2013-1999
Update to libXxf86vm 1.1.3
CVE-2013-2001
Update to libxcb 1.9.1
CVE-2013-2064
Update to libXt 1.1.4
CVE-2013-2002
CVE-2013-2005
Update to randrproto 1.4.0-r1
Update to inputproto 2.3
BUG=chromium:255523
TEST=run on lumpy and snow, trybots
Change-Id: Ibb21a9824f96e411ada3e7c743de0558f67304f0
Reviewed-on: https://gerrit.chromium.org/gerrit/60838
Commit-Queue: Stéphane Marchesin <marcheu@chromium.org>
Reviewed-by: Stéphane Marchesin <marcheu@chromium.org>
Tested-by: Stéphane Marchesin <marcheu@chromium.org>
44 files changed