|Category:||SuSE Local Security Checks|
|Title:||SuSE Update for libX11 openSUSE-SU-2018:3012-1 (libX11)|
|Summary:||The remote host is missing an update for the 'libX11'; package(s) announced via the openSUSE-SU-2018:3012_1 advisory.|
The remote host is missing an update for the 'libX11'
package(s) announced via the openSUSE-SU-2018:3012_1 advisory.
This update for libX11 fixes the following security issues:
- CVE-2018-14599: The function XListExtensions was vulnerable to an
off-by-one error caused by malicious server responses, leading to DoS or
possibly unspecified other impact (bsc#1102062)
- CVE-2018-14600: The function XListExtensions interpreted a variable as
signed instead of unsigned, resulting in an out-of-bounds write (of up
to 128 bytes), leading to DoS or remote code execution (bsc#1102068)
- CVE-2018-14598: A malicious server could have sent a reply in which the
first string overflows, causing a variable to be set to NULL that will
be freed later
on, leading to DoS (segmentation fault) (bsc#1102073)
This update was imported from the SUSE:SLE-15:Update update project.
To install this openSUSE Security Update use the SUSE recommended
like YaST online_update or 'zypper patch'.
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.0:
zypper in -t patch openSUSE-2018-1107=1
libX11 on openSUSE Leap 15.0.
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2018-14598|
Common Vulnerability Exposure (CVE) ID: CVE-2018-14599
Common Vulnerability Exposure (CVE) ID: CVE-2018-14600
|Copyright||Copyright (C) 2018 Greenbone Networks GmbH|
|This is only one of 71225 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.