RHEL 7 : X.org X11 (RHSA-2018:3059)

critical Nessus Plugin ID 118520

Synopsis

The remote Red Hat host is missing a security update.

Description

The remote Redhat Enterprise Linux 7 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2018:3059 advisory.

- libxcursor: 1-byte heap-based overflow in _XcursorThemeInherits function in library.c (CVE-2015-9262)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?2b0cc1e7

http://www.nessus.org/u?861df1b8

https://access.redhat.com/errata/RHSA-2018:3059

https://access.redhat.com/security/updates/classification/#low

https://bugzilla.redhat.com/show_bug.cgi?id=1259757

https://bugzilla.redhat.com/show_bug.cgi?id=1428340

https://bugzilla.redhat.com/show_bug.cgi?id=1496253

https://bugzilla.redhat.com/show_bug.cgi?id=1538756

https://bugzilla.redhat.com/show_bug.cgi?id=1564061

https://bugzilla.redhat.com/show_bug.cgi?id=1566101

https://bugzilla.redhat.com/show_bug.cgi?id=1570839

https://bugzilla.redhat.com/show_bug.cgi?id=1584740

https://bugzilla.redhat.com/show_bug.cgi?id=1592607

https://bugzilla.redhat.com/show_bug.cgi?id=1601742

https://bugzilla.redhat.com/show_bug.cgi?id=1601880

https://bugzilla.redhat.com/show_bug.cgi?id=1601960

https://bugzilla.redhat.com/show_bug.cgi?id=1602855

https://bugzilla.redhat.com/show_bug.cgi?id=1605325

https://bugzilla.redhat.com/show_bug.cgi?id=1611599

https://bugzilla.redhat.com/show_bug.cgi?id=1613264

https://bugzilla.redhat.com/show_bug.cgi?id=1631880

Plugin Details

Severity: Critical

ID: 118520

File Name: redhat-RHSA-2018-3059.nasl

Version: 1.7

Type: local

Agent: unix

Published: 10/31/2018

Updated: 4/27/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2015-9262

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:xcb-proto, p-cpe:/a:redhat:enterprise_linux:xorg-x11-utils, p-cpe:/a:redhat:enterprise_linux:xorg-x11-server-source, p-cpe:/a:redhat:enterprise_linux:xorg-x11-drv-void, p-cpe:/a:redhat:enterprise_linux:xorg-x11-drv-openchrome, p-cpe:/a:redhat:enterprise_linux:mesa-libgles-devel, p-cpe:/a:redhat:enterprise_linux:xorg-x11-drv-qxl, p-cpe:/a:redhat:enterprise_linux:libglvnd-opengl, p-cpe:/a:redhat:enterprise_linux:libxcb-devel, p-cpe:/a:redhat:enterprise_linux:mesa-libgbm, p-cpe:/a:redhat:enterprise_linux:mesa-vulkan-drivers, p-cpe:/a:redhat:enterprise_linux:vulkan-filesystem, p-cpe:/a:redhat:enterprise_linux:xorg-x11-drv-mouse-devel, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:tigervnc-server-minimal, p-cpe:/a:redhat:enterprise_linux:xorg-x11-server-devel, p-cpe:/a:redhat:enterprise_linux:mesa-libgl, p-cpe:/a:redhat:enterprise_linux:libwacom, p-cpe:/a:redhat:enterprise_linux:libglvnd, p-cpe:/a:redhat:enterprise_linux:libx11, p-cpe:/a:redhat:enterprise_linux:xorg-x11-font-utils, p-cpe:/a:redhat:enterprise_linux:tigervnc-server-applet, p-cpe:/a:redhat:enterprise_linux:xorg-x11-drv-evdev-devel, p-cpe:/a:redhat:enterprise_linux:mesa-libwayland-egl-devel, p-cpe:/a:redhat:enterprise_linux:xorg-x11-drv-v4l, p-cpe:/a:redhat:enterprise_linux:libxres, p-cpe:/a:redhat:enterprise_linux:mesa-libglapi, p-cpe:/a:redhat:enterprise_linux:libglvnd-egl, p-cpe:/a:redhat:enterprise_linux:libxfont-devel, p-cpe:/a:redhat:enterprise_linux:xorg-x11-drv-dummy, p-cpe:/a:redhat:enterprise_linux:tigervnc-server, p-cpe:/a:redhat:enterprise_linux:xorg-x11-drv-vesa, p-cpe:/a:redhat:enterprise_linux:libxfont2-devel, p-cpe:/a:redhat:enterprise_linux:xorg-x11-drv-synaptics-devel, p-cpe:/a:redhat:enterprise_linux:libwacom-data, p-cpe:/a:redhat:enterprise_linux:tigervnc, p-cpe:/a:redhat:enterprise_linux:libxcb-doc, p-cpe:/a:redhat:enterprise_linux:libdrm, p-cpe:/a:redhat:enterprise_linux:xorg-x11-server-xephyr, p-cpe:/a:redhat:enterprise_linux:xorg-x11-drv-mouse, p-cpe:/a:redhat:enterprise_linux:xorg-x11-drv-synaptics, p-cpe:/a:redhat:enterprise_linux:freeglut, p-cpe:/a:redhat:enterprise_linux:mesa-dri-drivers, p-cpe:/a:redhat:enterprise_linux:xorg-x11-server-xdmx, p-cpe:/a:redhat:enterprise_linux:xorg-x11-drv-libinput, p-cpe:/a:redhat:enterprise_linux:libxcb, p-cpe:/a:redhat:enterprise_linux:tigervnc-icons, p-cpe:/a:redhat:enterprise_linux:xorg-x11-drv-libinput-devel, p-cpe:/a:redhat:enterprise_linux:mesa-libgles, p-cpe:/a:redhat:enterprise_linux:mesa-libegl-devel, p-cpe:/a:redhat:enterprise_linux:xorg-x11-drv-evdev, p-cpe:/a:redhat:enterprise_linux:mesa-filesystem, p-cpe:/a:redhat:enterprise_linux:freeglut-devel, p-cpe:/a:redhat:enterprise_linux:xorg-x11-drv-intel, p-cpe:/a:redhat:enterprise_linux:xorg-x11-server-xwayland, p-cpe:/a:redhat:enterprise_linux:libinput, p-cpe:/a:redhat:enterprise_linux:xorg-x11-server-xspice, p-cpe:/a:redhat:enterprise_linux:xorg-x11-xkb-utils-devel, p-cpe:/a:redhat:enterprise_linux:xorg-x11-drv-nouveau, p-cpe:/a:redhat:enterprise_linux:xorg-x11-server-common, p-cpe:/a:redhat:enterprise_linux:libx11-common, p-cpe:/a:redhat:enterprise_linux:mesa-libxatracker-devel, p-cpe:/a:redhat:enterprise_linux:xkeyboard-config-devel, p-cpe:/a:redhat:enterprise_linux:xorg-x11-server-xnest, p-cpe:/a:redhat:enterprise_linux:libxcursor-devel, p-cpe:/a:redhat:enterprise_linux:xorg-x11-drv-fbdev, p-cpe:/a:redhat:enterprise_linux:tigervnc-license, p-cpe:/a:redhat:enterprise_linux:xorg-x11-drv-ati, p-cpe:/a:redhat:enterprise_linux:mesa-libgl-devel, p-cpe:/a:redhat:enterprise_linux:xorg-x11-drv-vmmouse, p-cpe:/a:redhat:enterprise_linux:xorg-x11-server-xorg, p-cpe:/a:redhat:enterprise_linux:libglvnd-gles, p-cpe:/a:redhat:enterprise_linux:libxres-devel, p-cpe:/a:redhat:enterprise_linux:xorg-x11-drv-openchrome-devel, p-cpe:/a:redhat:enterprise_linux:libglvnd-glx, p-cpe:/a:redhat:enterprise_linux:mesa-libegl, p-cpe:/a:redhat:enterprise_linux:libxfont2, p-cpe:/a:redhat:enterprise_linux:libglvnd-core-devel, p-cpe:/a:redhat:enterprise_linux:mesa-libwayland-egl, p-cpe:/a:redhat:enterprise_linux:xorg-x11-server, p-cpe:/a:redhat:enterprise_linux:mesa-libosmesa, p-cpe:/a:redhat:enterprise_linux:libx11-devel, p-cpe:/a:redhat:enterprise_linux:libxcursor, p-cpe:/a:redhat:enterprise_linux:egl-utils, p-cpe:/a:redhat:enterprise_linux:xorg-x11-drv-vmware, p-cpe:/a:redhat:enterprise_linux:mesa-libgbm-devel, p-cpe:/a:redhat:enterprise_linux:intel-gpu-tools, p-cpe:/a:redhat:enterprise_linux:libinput-devel, p-cpe:/a:redhat:enterprise_linux:vulkan, p-cpe:/a:redhat:enterprise_linux:xorg-x11-xkb-utils, p-cpe:/a:redhat:enterprise_linux:xorg-x11-xkb-extras, p-cpe:/a:redhat:enterprise_linux:drm-utils, p-cpe:/a:redhat:enterprise_linux:xorg-x11-drv-wacom-devel, p-cpe:/a:redhat:enterprise_linux:xorg-x11-drv-wacom, p-cpe:/a:redhat:enterprise_linux:mesa-libosmesa-devel, p-cpe:/a:redhat:enterprise_linux:libxfont, p-cpe:/a:redhat:enterprise_linux:glx-utils, p-cpe:/a:redhat:enterprise_linux:libwacom-devel, p-cpe:/a:redhat:enterprise_linux:tigervnc-server-module, p-cpe:/a:redhat:enterprise_linux:xorg-x11-drv-intel-devel, p-cpe:/a:redhat:enterprise_linux:libepoxy-devel, p-cpe:/a:redhat:enterprise_linux:libglvnd-devel, p-cpe:/a:redhat:enterprise_linux:xorg-x11-proto-devel, p-cpe:/a:redhat:enterprise_linux:mesa-vdpau-drivers, p-cpe:/a:redhat:enterprise_linux:xkeyboard-config, p-cpe:/a:redhat:enterprise_linux:mesa, p-cpe:/a:redhat:enterprise_linux:mesa-libxatracker, p-cpe:/a:redhat:enterprise_linux:mesa-demos, p-cpe:/a:redhat:enterprise_linux:vulkan-devel, p-cpe:/a:redhat:enterprise_linux:libepoxy, p-cpe:/a:redhat:enterprise_linux:libdrm-devel, p-cpe:/a:redhat:enterprise_linux:xorg-x11-server-xvfb

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 10/30/2018

Vulnerability Publication Date: 8/1/2018

Reference Information

CVE: CVE-2015-9262

CWE: 122

RHSA: 2018:3059