MGASA-2023-0287

Source
https://advisories.mageia.org/MGASA-2023-0287.html
Import Source
https://advisories.mageia.org/MGASA-2023-0287.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2023-0287
Related
Published
2023-10-13T22:56:51Z
Modified
2023-10-13T21:32:44Z
Summary
Updated libX11 packages fix security vulnerabilities
Details

A vulnerability was found in libX11 due to a boundary condition within the _XkbReadKeySyms() function. This flaw allows a local user to trigger an out-of-bounds read error and read the contents of memory on the system. (CVE-2023-43785)

A vulnerability was found in libX11 due to an infinite loop within the PutSubImage() function. This flaw allows a local user to consume all available system resources and cause a denial of service condition. (CVE-2023-43786)

A vulnerability was found in libX11 due to an integer overflow within the XCreateImage() function. This flaw allows a local user to trigger an integer overflow and execute arbitrary code with elevated privileges. (CVE-2023-43787)

References
Credits

Affected packages

Mageia:8 / libx11

Package

Name
libx11
Purl
pkg:rpm/mageia/libx11?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.7.0-1.5.mga8

Ecosystem specific

{
    "section": "core"
}

Mageia:9 / libx11

Package

Name
libx11
Purl
pkg:rpm/mageia/libx11?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.6-1.1.mga9

Ecosystem specific

{
    "section": "core"
}