Bug 48180 - libx11: Multiple issues (4.3)
libx11: Multiple issues (4.3)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.3
All Linux
: P3 normal (vote)
: UCS 4.3-2-errata
Assigned To: Quality Assurance
Philipp Hahn
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2018-11-19 12:47 CET by Quality Assurance
Modified: 2018-11-21 15:21 CET (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 5.0 (CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2018-11-19 12:47:50 CET
New Debian libx11 2:1.6.4-3+deb9u1 fixes:
This update addresses the following issues:
* Crash on invalid reply in XListExtensions in ListExt.c (CVE-2018-14598)
* off-by-one error in XListExtensions in ListExt.c (CVE-2018-14599)
* Out of Bounds write in XListExtensions in ListExt.c (CVE-2018-14600)
Comment 1 Quality Assurance univentionstaff 2018-11-19 13:43:38 CET
--- mirror/ftp/4.3/unmaintained/4.3-0/source/libx11_1.6.4-3.dsc
+++ apt/ucs_4.3-0-errata4.3-2/source/libx11_1.6.4-3+deb9u1.dsc
@@ -1,3 +1,21 @@
+2:1.6.4-3+deb9u1 [Sat, 29 Sep 2018 14:05:05 +0200] Markus Koschany <apo@debian.org>:
+
+  * Non-maintainer upload.
+  * Fix CVE-2018-14598, CVE-2018-14599 and CVE-2018-14600:
+  * CVE-2018-14599:
+    The functions XGetFontPath, XListExtensions, and XListFonts are vulnerable
+    to an off-by-one override on malicious server responses.
+  * CVE-2018-14600:
+    The length value is interpreted as signed char on many systems (depending
+    on default signedness of char), which can lead to an out of boundary write
+    up to 128 bytes in front of the allocated storage, but limited to NUL
+    byte(s).
+  * CVE-2018-14598:
+    If the server sends a reply in which even the first string would overflow
+    the transmitted bytes, list[0] (or flist[0]) will be set to NULL and a
+    count of 0 is returned. This may trigger a segmentation fault leading to a
+    Denial of Service.
+
 2:1.6.4-3 [Sat, 28 Jan 2017 00:06:50 +0100] Julien Cristau <jcristau@debian.org>:
 
   [ Emilio Pozuelo Monfort ]

<http://10.200.17.11/4.3-2/#7322076518633107478>
Comment 2 Philipp Hahn univentionstaff 2018-11-19 14:41:18 CET
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[4.3-2] 893de96ef0 Bug #48180: libx11 2:1.6.4-3+deb9u1
 doc/errata/staging/libx11.yaml | 16 ++++++++++++++++
 1 file changed, 16 insertions(+)
Comment 3 Arvid Requate univentionstaff 2018-11-21 15:21:30 CET
<http://errata.software-univention.de/ucs/4.3/322.html>