[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 3602-1] libx11 security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3602-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/               Emilio Pozuelo Monfort
October 05, 2023                              https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : libx11
Version        : 2:1.6.7-1+deb10u4
CVE ID         : CVE-2023-43785 CVE-2023-43786 CVE-2023-43787

Several vulnerabilities were found in libx11, the X11 client-side
library.

CVE-2023-43785

    Gregory James Duck discovered an out of bounds memory access in
    _XkbReadKeySyms, which could result in denial of service.

CVE-2023-43786

    Yair Mizrahi found an infinite recursion in PutSubImage when
    parsing a crafted file, which would result in stack exhaustion
    and denial of service.

CVE-2023-43787

    Yair Mizrahi discovered an integer overflow in XCreateImage
    when parsing crafted input, which would result in a small buffer
    allocation leading into a buffer overflow. This could result
    in denial of service or potentially in arbitrary code execution.

For Debian 10 buster, these problems have been fixed in version
2:1.6.7-1+deb10u4.

We recommend that you upgrade your libx11 packages.

For the detailed security status of libx11 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libx11

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
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=qFN9
-----END PGP SIGNATURE-----


Reply to: