Scientific Linux Security Update : X11 libraries on SL7.x x86_64

This script is Copyright (C) 2017 Tenable Network Security, Inc.

Synopsis :

The remote Scientific Linux host is missing one or more security

Description :

The following packages have been upgraded to a later upstream version:
libX11 (1.6.5), libXaw (1.0.13), libXdmcp (1.1.2), libXfixes (5.0.3),
libXfont (1.5.2), libXi (1.7.9), libXpm (3.5.12), libXrandr (1.5.1),
libXrender (0.9.10), libXt (1.1.5), libXtst (1.2.3), libXv (1.0.11),
libXvMC (1.0.10), libXxf86vm (1.1.4), libdrm (2.4.74), libepoxy
(1.3.1), libevdev (1.5.6), libfontenc (1.1.3), libvdpau (1.1.1),
libwacom (0.24), libxcb (1.12), libxkbfile (1.0.9), mesa (17.0.1),
mesa-private-llvm (3.9.1), xcb-proto (1.12), xkeyboard-config (2.20),
xorg-x11-proto-devel (7.7).

Security Fix(es) :

- An integer overflow flaw leading to a heap-based buffer
overflow was found in libXpm. An attacker could use this
flaw to crash an application using libXpm via a
specially crafted XPM file. (CVE-2016-10164)

- It was discovered that libXdmcp used weak entropy to
generate session keys. On a multi-user system using
xdmcp, a local attacker could potentially use
information available from the process list to brute
force the key, allowing them to hijack other users'
sessions. (CVE-2017-2625)

- It was discovered that libICE used a weak entropy to
generate keys. A local attacker could potentially use
this flaw for session hijacking using the information
available from the process list. (CVE-2017-2626)

See also :

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.5

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 102636 ()

Bugtraq ID:

CVE ID: CVE-2016-10164

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now