Red Hat Bugzilla – Bug 1623238
CVE-2018-14598 libX11: Crash on invalid reply in XListExtensions in ListExt.c
Last modified: 2018-09-19 08:37:52 EDT
An issue was discovered in ListExt.c:XListExtensions and GetFPath.c:XGetFontPath in libX11 through version 1.6.5. A malicious server can send a reply in which the first string overflows, causing a variable to be set to NULL that will be freed later on, leading to DoS (segmentation fault). References: http://www.openwall.com/lists/oss-security/2018/08/21/6 https://lists.x.org/archives/xorg-announce/2018-August/002916.html Upstream Patch: https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=e83722768fd5c467ef61fa159e8c6278770b45c2
Created libX11 tracking bugs for this issue: Affects: fedora-all [bug 1623239]
When a reply from a malicious server has the first element with an invalid length, the ListExt.c:XListExtensions and GetFPath.c:XGetFontPath functions may wrongly initialize the returned list. Thus a following call to XFreeExtensionsList/XFreeFontPath will try to access an invalid list, causing a segmentation fault in the client program.
Statement: This issue did not affect the versions of libX11 as shipped with Red Hat Enterprise Linux 5 as they did not include the vulnerable code.