An issue exists in XListExtensions in ListExt.c in libX11 up to and including 1.6.5. A malicious server can send a reply in which the first string overflows, causing a variable to be set to NULL that will be freed later on, leading to DoS (segmentation fault).
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
x.org libx11 |
||
debian debian linux 8.0 |
||
canonical ubuntu linux 16.04 |
||
canonical ubuntu linux 14.04 |
||
canonical ubuntu linux 12.04 |
||
canonical ubuntu linux 18.04 |
||
fedoraproject fedora 28 |