- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3602-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/               Emilio Pozuelo Monfort
October 05, 2023                              https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : libx11
Version        : 2:1.6.7-1+deb10u4
CVE ID         : CVE-2023-43785 CVE-2023-43786 CVE-2023-43787

Several vulnerabilities were found in libx11, the X11 client-side
library.

CVE-2023-43785

    Gregory James Duck discovered an out of bounds memory access in
    _XkbReadKeySyms, which could result in denial of service.

CVE-2023-43786

    Yair Mizrahi found an infinite recursion in PutSubImage when
    parsing a crafted file, which would result in stack exhaustion
    and denial of service.

CVE-2023-43787

    Yair Mizrahi discovered an integer overflow in XCreateImage
    when parsing crafted input, which would result in a small buffer
    allocation leading into a buffer overflow. This could result
    in denial of service or potentially in arbitrary code execution.

For Debian 10 buster, these problems have been fixed in version
2:1.6.7-1+deb10u4.

We recommend that you upgrade your libx11 packages.

For the detailed security status of libx11 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/libx11

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-3602-1: libx11 security update

October 5, 2023
Several vulnerabilities were found in libx11, the X11 client-side library

Summary

CVE-2023-43785

Gregory James Duck discovered an out of bounds memory access in
_XkbReadKeySyms, which could result in denial of service.

CVE-2023-43786

Yair Mizrahi found an infinite recursion in PutSubImage when
parsing a crafted file, which would result in stack exhaustion
and denial of service.

CVE-2023-43787

Yair Mizrahi discovered an integer overflow in XCreateImage
when parsing crafted input, which would result in a small buffer
allocation leading into a buffer overflow. This could result
in denial of service or potentially in arbitrary code execution.

For Debian 10 buster, these problems have been fixed in version
2:1.6.7-1+deb10u4.

We recommend that you upgrade your libx11 packages.

For the detailed security status of libx11 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/libx11

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


Severity
Package : libx11
Version : 2:1.6.7-1+deb10u4
CVE ID : CVE-2023-43785 CVE-2023-43786 CVE-2023-43787

Related News