Lucene search

K
centosCentOS ProjectCESA-2019:2079
HistoryAug 30, 2019 - 2:52 a.m.

gdm, libX11, libxkbcommon, xorg security update

2019-08-3002:52:02
CentOS Project
lists.centos.org
267

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

6.6 Medium

AI Score

Confidence

High

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.066 Low

EPSS

Percentile

93.7%

CentOS Errata and Security Advisory CESA-2019:2079

X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.

Security Fix(es):

  • libX11: Crash on invalid reply in XListExtensions in ListExt.c (CVE-2018-14598)

  • libX11: Off-by-one error in XListExtensions in ListExt.c (CVE-2018-14599)

  • libX11: Out of Bounds write in XListExtensions in ListExt.c (CVE-2018-14600)

  • libxkbcommon: Invalid free in ExprAppendMultiKeysymList resulting in a crash (CVE-2018-15857)

  • libxkbcommon: Endless recursion in xkbcomp/expr.c resulting in a crash (CVE-2018-15853)

  • libxkbcommon: NULL pointer dereference resulting in a crash (CVE-2018-15854)

  • libxkbcommon: NULL pointer dereference when handling xkb_geometry (CVE-2018-15855)

  • libxkbcommon: Infinite loop when reaching EOL unexpectedly resulting in a crash (CVE-2018-15856)

  • libxkbcommon: NULL pointer dereference when parsing invalid atoms in ExprResolveLhs resulting in a crash (CVE-2018-15859)

  • libxkbcommon: NULL pointer dereference in ExprResolveLhs resulting in a crash (CVE-2018-15861)

  • libxkbcommon: NULL pointer dereference in LookupModMask resulting in a crash (CVE-2018-15862)

  • libxkbcommon: NULL pointer dereference in ResolveStateAndPredicate resulting in a crash (CVE-2018-15863)

  • libxkbcommon: NULL pointer dereference in resolve_keysym resulting in a crash (CVE-2018-15864)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.7 Release Notes linked from the References section.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2020-February/085760.html
https://lists.centos.org/pipermail/centos-cr-announce/2019-August/032150.html
https://lists.centos.org/pipermail/centos-cr-announce/2019-August/032246.html
https://lists.centos.org/pipermail/centos-cr-announce/2019-August/032247.html
https://lists.centos.org/pipermail/centos-cr-announce/2019-August/032456.html
https://lists.centos.org/pipermail/centos-cr-announce/2019-August/032458.html
https://lists.centos.org/pipermail/centos-cr-announce/2019-August/032459.html
https://lists.centos.org/pipermail/centos-cr-announce/2019-August/032460.html

Affected packages:
gdm
gdm-devel
gdm-pam-extensions-devel
libX11
libX11-common
libX11-devel
libxkbcommon
libxkbcommon-devel
libxkbcommon-x11
libxkbcommon-x11-devel
xorg-x11-drv-ati
xorg-x11-drv-vesa
xorg-x11-drv-wacom
xorg-x11-drv-wacom-devel
xorg-x11-server-Xdmx
xorg-x11-server-Xephyr
xorg-x11-server-Xnest
xorg-x11-server-Xorg
xorg-x11-server-Xvfb
xorg-x11-server-Xwayland
xorg-x11-server-common
xorg-x11-server-devel
xorg-x11-server-source

Upstream details at:
https://access.redhat.com/errata/RHSA-2019:2079

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

6.6 Medium

AI Score

Confidence

High

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.066 Low

EPSS

Percentile

93.7%