USN-6407-1: libx11 vulnerabilities
3 October 2023
Several security issues were fixed in libx11.
Releases
Packages
- libx11 - X11 client-side library
Details
Gregory James Duck discovered that libx11 incorrectly handled certain
keyboard symbols. If a user were tricked into connecting to a malicious X
server, a remote attacker could use this issue to cause libx11 to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2023-43785)
Yair Mizrahi discovered that libx11 incorrectly handled certain malformed
XPM image files. If a user were tricked into opening a specially crafted
XPM image file, a remote attacker could possibly use this issue to consume
memory, leading to a denial of service. (CVE-2023-43786)
Yair Mizrahi discovered that libx11 incorrectly handled certain malformed
XPM image files. If a user were tricked into opening a specially crafted
XPM image file, a remote attacker could use this issue to cause libx11 to
crash, leading to a denial of service, or possibly execute arbitrary code.
(CVE-2023-43787)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 23.04
Ubuntu 22.04
Ubuntu 20.04
After a standard system update you need to reboot your computer to make all
the necessary changes.
References
Related notices
- USN-6407-2: libx11-doc, libx11-xcb1, libx11-data, libx11, libx11-6, libx11-xcb-dev, libx11-dev
- USN-6408-1: xpmutils, libxpm, libxpm-dev, libxpm4
- USN-6408-2: xpmutils, libxpm, libxpm-dev, libxpm4