Debian Security Advisory
DLA-1482-1 libx11 -- LTS security update
- Date Reported:
- 29 Aug 2018
- Affected Packages:
- libx11
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2018-14598, CVE-2018-14599, CVE-2018-14600.
- More information:
-
Several issues were discovered in libx11, the client interface to the X Windows System. The functions XGetFontPath, XListExtensions, and XListFonts are vulnerable to an off-by-one override on malicious server responses. A malicious server could also send a reply in which the first string overflows, causing a variable set to NULL that will be freed later on, leading to a segmentation fault and Denial of Service. The function XListExtensions in ListExt.c interprets a variable as signed instead of unsigned, resulting in an out-of-bounds write (of up to 128 bytes), leading to a Denial of Service or possibly remote code execution.
For Debian 8
Jessie
, these problems have been fixed in version 2:1.6.2-3+deb8u2.We recommend that you upgrade your libx11 packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS