RHEL 3 : XFree86 (RHSA-2005:501)

Medium Nessus Plugin ID 19712


The remote Red Hat host is missing one or more security updates.


Updated XFree86 packages that fix several integer overflows, various bugs, and add ATI RN50/ES1000 support are now available for Red Hat Enterprise Linux 3.

This update has been rated as having important security impact by the Red Hat Security Response Team.

XFree86 is an implementation of the X Window System, which provides the core functionality for the Linux graphical desktop.

Several integer overflow bugs were found in the way XFree86 parses pixmap images. It is possible for a user to gain elevated privileges by loading a specially crafted pixmap image. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-2495 to this issue.

Additionally this update adds the following new features in this release: - Support for ATI RN50/ES1000 chipsets has been added.

The following bugs were also fixed in this release: - A problem with the X server's module loading system that led to cache incoherency on the Itanium architecture.

- The X server's PCI config space accesses caused contention with the kernel if accesses occurred while the kernel lock was held.

- X font server (xfs) crashed when accessing Type 1 fonts via showfont.

- A problem with the X transport library prevented X applications from starting if the hostname started with a digit.

- An issue where refresh rates were being restricted to 60Hz on some Intel i8xx systems

Users of XFree86 should upgrade to these updated packages, which contain a backported patch and are not vulnerable to this issue.


Update the affected packages.

See Also



Plugin Details

Severity: Medium

ID: 19712

File Name: redhat-RHSA-2005-501.nasl

Version: $Revision: 1.18 $

Type: local

Agent: unix

Published: 2005/09/17

Modified: 2016/12/28

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5.1

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:XFree86, p-cpe:/a:redhat:enterprise_linux:XFree86-100dpi-fonts, p-cpe:/a:redhat:enterprise_linux:XFree86-75dpi-fonts, p-cpe:/a:redhat:enterprise_linux:XFree86-ISO8859-14-100dpi-fonts, p-cpe:/a:redhat:enterprise_linux:XFree86-ISO8859-14-75dpi-fonts, p-cpe:/a:redhat:enterprise_linux:XFree86-ISO8859-15-100dpi-fonts, p-cpe:/a:redhat:enterprise_linux:XFree86-ISO8859-15-75dpi-fonts, p-cpe:/a:redhat:enterprise_linux:XFree86-ISO8859-2-100dpi-fonts, p-cpe:/a:redhat:enterprise_linux:XFree86-ISO8859-2-75dpi-fonts, p-cpe:/a:redhat:enterprise_linux:XFree86-ISO8859-9-100dpi-fonts, p-cpe:/a:redhat:enterprise_linux:XFree86-ISO8859-9-75dpi-fonts, p-cpe:/a:redhat:enterprise_linux:XFree86-Mesa-libGL, p-cpe:/a:redhat:enterprise_linux:XFree86-Mesa-libGLU, p-cpe:/a:redhat:enterprise_linux:XFree86-Xnest, p-cpe:/a:redhat:enterprise_linux:XFree86-Xvfb, p-cpe:/a:redhat:enterprise_linux:XFree86-base-fonts, p-cpe:/a:redhat:enterprise_linux:XFree86-cyrillic-fonts, p-cpe:/a:redhat:enterprise_linux:XFree86-devel, p-cpe:/a:redhat:enterprise_linux:XFree86-doc, p-cpe:/a:redhat:enterprise_linux:XFree86-font-utils, p-cpe:/a:redhat:enterprise_linux:XFree86-libs, p-cpe:/a:redhat:enterprise_linux:XFree86-libs-data, p-cpe:/a:redhat:enterprise_linux:XFree86-sdk, p-cpe:/a:redhat:enterprise_linux:XFree86-syriac-fonts, p-cpe:/a:redhat:enterprise_linux:XFree86-tools, p-cpe:/a:redhat:enterprise_linux:XFree86-truetype-fonts, p-cpe:/a:redhat:enterprise_linux:XFree86-twm, p-cpe:/a:redhat:enterprise_linux:XFree86-xauth, p-cpe:/a:redhat:enterprise_linux:XFree86-xdm, p-cpe:/a:redhat:enterprise_linux:XFree86-xfs, cpe:/o:redhat:enterprise_linux:3

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 2005/09/15

Reference Information

CVE: CVE-2005-2495

RHSA: 2005:501