vulnerability
Red Hat: CVE-2018-14598: Moderate: Xorg security and bug fix update (RHSA-2019:2079)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | Aug 24, 2018 | Aug 7, 2019 | Jul 9, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Aug 24, 2018
Added
Aug 7, 2019
Modified
Jul 9, 2025
Description
An issue was discovered in XListExtensions in ListExt.c in libX11 through 1.6.5. A malicious server can send a reply in which the first string overflows, causing a variable to be set to NULL that will be freed later on, leading to DoS (segmentation fault).
Solution(s)
no-fix-redhat-rpm-packageredhat-upgrade-gdmredhat-upgrade-gdm-debuginforedhat-upgrade-gdm-develredhat-upgrade-gdm-pam-extensions-develredhat-upgrade-libx11redhat-upgrade-libx11-commonredhat-upgrade-libx11-debuginforedhat-upgrade-libx11-develredhat-upgrade-libxkbcommonredhat-upgrade-libxkbcommon-debuginforedhat-upgrade-libxkbcommon-develredhat-upgrade-libxkbcommon-x11redhat-upgrade-libxkbcommon-x11-develredhat-upgrade-mesa-libglwredhat-upgrade-mesa-libglw-debuginforedhat-upgrade-mesa-libglw-develredhat-upgrade-xorg-x11-drv-atiredhat-upgrade-xorg-x11-drv-ati-debuginforedhat-upgrade-xorg-x11-drv-vesaredhat-upgrade-xorg-x11-drv-vesa-debuginforedhat-upgrade-xorg-x11-drv-wacomredhat-upgrade-xorg-x11-drv-wacom-debuginforedhat-upgrade-xorg-x11-drv-wacom-develredhat-upgrade-xorg-x11-server-commonredhat-upgrade-xorg-x11-server-debuginforedhat-upgrade-xorg-x11-server-develredhat-upgrade-xorg-x11-server-sourceredhat-upgrade-xorg-x11-server-xdmxredhat-upgrade-xorg-x11-server-xephyrredhat-upgrade-xorg-x11-server-xnestredhat-upgrade-xorg-x11-server-xorgredhat-upgrade-xorg-x11-server-xvfbredhat-upgrade-xorg-x11-server-xwayland
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.