RHEL 8:使用者空間圖形、xorg-x11 和 mesa (RHSA-2021: 1804)

high Nessus Plugin ID 149659

概要

遠端 Red Hat 主機缺少一個或多個安全性更新。

說明

遠端 Redhat Enterprise Linux 8 主機上安裝的套件受到 RHSA-2021: 1804 公告中提及的弱點影響。

- libX11: X 輸入法用戶端中存在堆積溢位弱點 (CVE-2020-14344)

- xorg-x11-server: XkbSetNames 函式中存在超出邊界存取問題 (CVE-2020-14345)

- xorg-x11-server: X input extension 通訊協定中存在整數反向溢位問題 (CVE-2020-14346)

- xorg-x11-server: 未初始化的堆積記憶體從 X 伺服器洩漏到 dix/pixmap.c 之 AllocatePixmap 中的用戶端 (CVE-2020-14347)

- xorg-x11-server: XkbSetMap 函式中存在超出邊界存取問題 (CVE-2020-14360)

- xorg-x11-server: XkbSelectEvents 整數反向溢位和權限提升弱點 (CVE-2020-14361)

- xorg-x11-server: XRecordRegisterClients 整數反向溢位和權限提升弱點 (CVE-2020-14362)

- libX11: 處理地區設定時存在整數溢位問題,可造成雙重釋放 (CVE-2020-14363)

- xorg-x11-server: XkbSetDeviceInfo 堆積型緩衝區溢位權限提升弱點 (CVE-2020-25712)

請注意,Nessus 並未測試這些問題,而是僅依據應用程式自我報告的版本號碼作出判斷。

解決方案

更新受影響的套件。

另請參閱

https://access.redhat.com/security/cve/CVE-2020-14363

https://access.redhat.com/security/cve/CVE-2020-14345

https://access.redhat.com/security/cve/CVE-2020-14346

https://access.redhat.com/security/cve/CVE-2020-14361

https://bugzilla.redhat.com/1872473

https://access.redhat.com/security/cve/CVE-2020-14362

https://bugzilla.redhat.com/1862241

https://bugzilla.redhat.com/1862246

https://bugzilla.redhat.com/1869142

https://bugzilla.redhat.com/1869144

https://access.redhat.com/security/cve/CVE-2020-14347

https://access.redhat.com/security/cve/CVE-2020-14360

https://access.redhat.com/security/cve/CVE-2020-25712

https://bugzilla.redhat.com/1862258

https://bugzilla.redhat.com/1869139

https://bugzilla.redhat.com/1887276

https://access.redhat.com/errata/RHSA-2021:1804

https://access.redhat.com/security/cve/CVE-2020-14344

https://bugzilla.redhat.com/1862255

Plugin 詳細資訊

嚴重性: High

ID: 149659

檔案名稱: redhat-RHSA-2021-1804.nasl

版本: 1.9

類型: local

代理程式: unix

已發布: 2021/5/19

已更新: 2024/1/1

支援的感應器: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

風險資訊

VPR

風險因素: Medium

分數: 6.7

CVSS v2

風險因素: Medium

基本分數: 6.1

時間分數: 4.8

媒介: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:C

CVSS 評分資料來源: CVE-2020-14360

CVSS v3

風險因素: High

基本分數: 7.8

時間分數: 7

媒介: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

時間媒介: CVSS:3.0/E:P/RL:O/RC:C

CVSS 評分資料來源: CVE-2020-25712

弱點資訊

CPE: cpe:/o:redhat:enterprise_linux:8, cpe:/o:redhat:rhel_aus:8.4, cpe:/o:redhat:rhel_aus:8.6, cpe:/o:redhat:rhel_e4s:8.4, cpe:/o:redhat:rhel_e4s:8.6, cpe:/o:redhat:rhel_eus:8.4, cpe:/o:redhat:rhel_eus:8.6, cpe:/o:redhat:rhel_tus:8.4, cpe:/o:redhat:rhel_tus:8.6, p-cpe:/a:redhat:enterprise_linux:egl-wayland, p-cpe:/a:redhat:enterprise_linux:libx11, p-cpe:/a:redhat:enterprise_linux:libx11-common, p-cpe:/a:redhat:enterprise_linux:libx11-devel, p-cpe:/a:redhat:enterprise_linux:libx11-xcb, p-cpe:/a:redhat:enterprise_linux:libdrm, p-cpe:/a:redhat:enterprise_linux:libdrm-devel, p-cpe:/a:redhat:enterprise_linux:libglvnd, p-cpe:/a:redhat:enterprise_linux:libglvnd-core-devel, p-cpe:/a:redhat:enterprise_linux:libglvnd-devel, p-cpe:/a:redhat:enterprise_linux:libglvnd-egl, p-cpe:/a:redhat:enterprise_linux:libglvnd-gles, p-cpe:/a:redhat:enterprise_linux:libglvnd-glx, p-cpe:/a:redhat:enterprise_linux:libglvnd-opengl, p-cpe:/a:redhat:enterprise_linux:libinput, p-cpe:/a:redhat:enterprise_linux:libinput-devel, p-cpe:/a:redhat:enterprise_linux:libinput-utils, p-cpe:/a:redhat:enterprise_linux:libwacom, p-cpe:/a:redhat:enterprise_linux:libwacom-data, p-cpe:/a:redhat:enterprise_linux:libwacom-devel, p-cpe:/a:redhat:enterprise_linux:mesa-dri-drivers, p-cpe:/a:redhat:enterprise_linux:mesa-filesystem, p-cpe:/a:redhat:enterprise_linux:mesa-libegl, p-cpe:/a:redhat:enterprise_linux:mesa-libegl-devel, p-cpe:/a:redhat:enterprise_linux:mesa-libgl, p-cpe:/a:redhat:enterprise_linux:mesa-libgl-devel, p-cpe:/a:redhat:enterprise_linux:mesa-libosmesa, p-cpe:/a:redhat:enterprise_linux:mesa-libosmesa-devel, p-cpe:/a:redhat:enterprise_linux:mesa-libgbm, p-cpe:/a:redhat:enterprise_linux:mesa-libgbm-devel, p-cpe:/a:redhat:enterprise_linux:mesa-libglapi, p-cpe:/a:redhat:enterprise_linux:mesa-libxatracker, p-cpe:/a:redhat:enterprise_linux:mesa-vdpau-drivers, p-cpe:/a:redhat:enterprise_linux:mesa-vulkan-devel, p-cpe:/a:redhat:enterprise_linux:mesa-vulkan-drivers, p-cpe:/a:redhat:enterprise_linux:xorg-x11-drivers, p-cpe:/a:redhat:enterprise_linux:xorg-x11-server-xdmx, p-cpe:/a:redhat:enterprise_linux:xorg-x11-server-xephyr, p-cpe:/a:redhat:enterprise_linux:xorg-x11-server-xnest, p-cpe:/a:redhat:enterprise_linux:xorg-x11-server-xorg, p-cpe:/a:redhat:enterprise_linux:xorg-x11-server-xvfb, p-cpe:/a:redhat:enterprise_linux:xorg-x11-server-xwayland, p-cpe:/a:redhat:enterprise_linux:xorg-x11-server-common, p-cpe:/a:redhat:enterprise_linux:xorg-x11-server-devel, p-cpe:/a:redhat:enterprise_linux:xorg-x11-server-source

必要的 KB 項目: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

可被惡意程式利用: true

可輕鬆利用: Exploits are available

修補程式發佈日期: 2021/5/18

弱點發布日期: 2020/8/5

參考資訊

CVE: CVE-2020-14344, CVE-2020-14345, CVE-2020-14346, CVE-2020-14347, CVE-2020-14360, CVE-2020-14361, CVE-2020-14362, CVE-2020-14363, CVE-2020-25712

CWE: 119, 122, 190, 191, 416, 665

IAVB: 2020-B-0051

RHSA: 2021:1804