Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 22 Aug 2018 19:28:01 +0000 (UTC)
From:      Niclas Zeising <zeising@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r477811 - head/security/vuxml
Message-ID:  <201808221928.w7MJS1eX058661@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: zeising
Date: Wed Aug 22 19:28:01 2018
New Revision: 477811
URL: https://svnweb.freebsd.org/changeset/ports/477811

Log:
  Document libX11 vulnerabilities.
  
  CVE-2018-14598
  CVE-2018-14599
  CVE-2018-14600
  
  https://lists.x.org/archives/xorg-announce/2018-August/002915.html

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Wed Aug 22 18:57:49 2018	(r477810)
+++ head/security/vuxml/vuln.xml	Wed Aug 22 19:28:01 2018	(r477811)
@@ -58,6 +58,57 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="fe99d3ca-a63a-11e8-a7c6-54e1ad3d6335">
+    <topic>libX11 -- Multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>libX11</name>
+	<range><lt>1.6.6,1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The freedesktop.org project reports:</p>
+	<blockquote cite="https://lists.x.org/archives/xorg-announce/2018-August/002915.html">;
+	  <p>The functions XGetFontPath, XListExtensions, and XListFonts are
+	    vulnerable to an off-by-one override on malicious server responses.
+	    The server replies consist of chunks consisting of a length byte
+	    followed by actual string, which is not NUL-terminated.
+	    While parsing the response, the length byte is overridden with '\0',
+	    thus the memory area can be used as storage of C strings later on.
+	    To be able to NUL-terminate the last string, the buffer is reserved
+	    with an additional byte of space. For a boundary check, the variable
+	    chend (end of ch) was introduced, pointing at the end of the buffer
+	    which ch initially points to. Unfortunately there is a difference
+	    in handling "the end of ch". While chend points at the first byte
+	    that must not be written to, the for-loop uses chend as the last
+	    byte that can be written to. Therefore, an off-by-one can occur.</p>
+	  <p>The length value is interpreted as signed char on many systems
+	    (depending on default signedness of char), which can lead to an out
+	    of boundary write up to 128 bytes in front of the allocated storage,
+	    but limited to NUL byte(s).</p>
+	  <p>If the server sends a reply in which even the first string would
+	    overflow the transmitted bytes, list[0] (or flist[0]) will be set to
+	    NULL and a count of 0 is returned. If the resulting list is freed
+	    with XFreeExtensionList or XFreeFontPath later on, the first Xfree
+	    call is turned into Xfree (NULL-1) which will most likely trigger a
+	    segmentation fault. Casting the length value to unsigned char fixes
+	    the problem and allows string values with up to 255 characters.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://lists.x.org/archives/xorg-announce/2018-August/002915.html</url>;
+      <cvename>CVE-2018-14598</cvename>
+      <cvename>CVE-2018-14599</cvename>
+      <cvename>CVE-2018-14600</cvename>
+    </references>
+    <dates>
+      <discovery>2018-08-21</discovery>
+      <entry>2018-08-22</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="9b19b6df-a4be-11e8-9366-0028f8d09152">
     <topic>couchdb -- administrator privilege escalation</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201808221928.w7MJS1eX058661>