Scientific Linux Security Update : Xorg on SL7.x x86_64 (20190806)

critical Nessus Plugin ID 128206

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

Security Fix(es) :

- libX11: Crash on invalid reply in XListExtensions in ListExt.c (CVE-2018-14598)

- libX11: Off-by-one error in XListExtensions in ListExt.c (CVE-2018-14599)

- libX11: Out of Bounds write in XListExtensions in ListExt.c (CVE-2018-14600)

- libxkbcommon: Invalid free in ExprAppendMultiKeysymList resulting in a crash (CVE-2018-15857)

- libxkbcommon: Endless recursion in xkbcomp/expr.c resulting in a crash (CVE-2018-15853)

- libxkbcommon: NULL pointer dereference resulting in a crash (CVE-2018-15854)

- libxkbcommon: NULL pointer dereference when handling xkb_geometry (CVE-2018-15855)

- libxkbcommon: Infinite loop when reaching EOL unexpectedly resulting in a crash (CVE-2018-15856)

- libxkbcommon: NULL pointer dereference when parsing invalid atoms in ExprResolveLhs resulting in a crash (CVE-2018-15859)

- libxkbcommon: NULL pointer dereference in ExprResolveLhs resulting in a crash (CVE-2018-15861)

- libxkbcommon: NULL pointer dereference in LookupModMask resulting in a crash (CVE-2018-15862)

- libxkbcommon: NULL pointer dereference in ResolveStateAndPredicate resulting in a crash (CVE-2018-15863)

- libxkbcommon: NULL pointer dereference in resolve_keysym resulting in a crash (CVE-2018-15864)

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?174243fc

Plugin Details

Severity: Critical

ID: 128206

File Name: sl_20190806_Xorg_on_SL7_x.nasl

Version: 1.3

Type: local

Agent: unix

Published: 8/27/2019

Updated: 2/24/2020

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:fermilab:scientific_linux:gdm, p-cpe:/a:fermilab:scientific_linux:gdm-debuginfo, p-cpe:/a:fermilab:scientific_linux:gdm-devel, p-cpe:/a:fermilab:scientific_linux:gdm-pam-extensions-devel, p-cpe:/a:fermilab:scientific_linux:libx11, p-cpe:/a:fermilab:scientific_linux:libx11-common, p-cpe:/a:fermilab:scientific_linux:libx11-debuginfo, p-cpe:/a:fermilab:scientific_linux:libx11-devel, p-cpe:/a:fermilab:scientific_linux:libxkbcommon, p-cpe:/a:fermilab:scientific_linux:libxkbcommon-debuginfo, p-cpe:/a:fermilab:scientific_linux:libxkbcommon-devel, p-cpe:/a:fermilab:scientific_linux:libxkbcommon-x11, p-cpe:/a:fermilab:scientific_linux:libxkbcommon-x11-devel, p-cpe:/a:fermilab:scientific_linux:mesa-libglw, p-cpe:/a:fermilab:scientific_linux:mesa-libglw-debuginfo, p-cpe:/a:fermilab:scientific_linux:mesa-libglw-devel, p-cpe:/a:fermilab:scientific_linux:xorg-x11-drv-ati, p-cpe:/a:fermilab:scientific_linux:xorg-x11-drv-ati-debuginfo, p-cpe:/a:fermilab:scientific_linux:xorg-x11-drv-vesa, p-cpe:/a:fermilab:scientific_linux:xorg-x11-drv-vesa-debuginfo, p-cpe:/a:fermilab:scientific_linux:xorg-x11-drv-wacom, p-cpe:/a:fermilab:scientific_linux:xorg-x11-drv-wacom-debuginfo, p-cpe:/a:fermilab:scientific_linux:xorg-x11-drv-wacom-devel, p-cpe:/a:fermilab:scientific_linux:xorg-x11-server-xdmx, p-cpe:/a:fermilab:scientific_linux:xorg-x11-server-xephyr, p-cpe:/a:fermilab:scientific_linux:xorg-x11-server-xnest, p-cpe:/a:fermilab:scientific_linux:xorg-x11-server-xorg, p-cpe:/a:fermilab:scientific_linux:xorg-x11-server-xvfb, p-cpe:/a:fermilab:scientific_linux:xorg-x11-server-xwayland, p-cpe:/a:fermilab:scientific_linux:xorg-x11-server-common, p-cpe:/a:fermilab:scientific_linux:xorg-x11-server-debuginfo, p-cpe:/a:fermilab:scientific_linux:xorg-x11-server-devel, p-cpe:/a:fermilab:scientific_linux:xorg-x11-server-source, x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 8/6/2019

Vulnerability Publication Date: 8/24/2018

Reference Information

CVE: CVE-2018-14598, CVE-2018-14599, CVE-2018-14600, CVE-2018-15853, CVE-2018-15854, CVE-2018-15855, CVE-2018-15856, CVE-2018-15857, CVE-2018-15859, CVE-2018-15861, CVE-2018-15862, CVE-2018-15863, CVE-2018-15864