First published: Fri Aug 24 2018(Updated: )
An issue was discovered in ListExt.c:XListExtensions and GetFPath.c:XGetFontPath in libX11 through version 1.6.5. A malicious server can send a reply in which the first string overflows, causing a variable to be set to NULL that will be freed later on, leading to DoS (segmentation fault). References: <a href="http://www.openwall.com/lists/oss-security/2018/08/21/6">http://www.openwall.com/lists/oss-security/2018/08/21/6</a> <a href="https://lists.x.org/archives/xorg-announce/2018-August/002916.html">https://lists.x.org/archives/xorg-announce/2018-August/002916.html</a> Upstream Patch: <a href="https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=e83722768fd5c467ef61fa159e8c6278770b45c2">https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=e83722768fd5c467ef61fa159e8c6278770b45c2</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
X.Org libX11 | <=1.6.5 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Debian Debian Linux | =8.0 | |
Fedoraproject Fedora | =28 | |
redhat/libX11 | <1.6.6 | 1.6.6 |
debian/libx11 | 2:1.7.2-1+deb11u2 2:1.8.4-2+deb12u2 2:1.8.7-1 |
https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=e83722768fd5c467ef61fa159e8c6278770b45c2
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-14598 is a vulnerability in libX11 that allows a malicious server to cause a denial of service (DoS) by sending a reply with a string that overflows.
CVE-2018-14598 has a severity rating of 7.5 (High).
The affected software includes libX11 versions up to and including 1.6.5, X.Org libX11, Canonical Ubuntu Linux versions 12.04, 14.04, 16.04, and 18.04, Debian Debian Linux version 8.0, and Fedoraproject Fedora version 28.
To fix CVE-2018-14598, you should update to libX11 version 1.6.6 or higher.
You can find more information about CVE-2018-14598 at the following links: [Openwall](http://www.openwall.com/lists/oss-security/2018/08/21/6), [X.Org](https://lists.x.org/archives/xorg-announce/2018-August/002916.html), and [Freedesktop](https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=e83722768fd5c467ef61fa159e8c6278770b45c2).