USN-6407-1

Source
https://ubuntu.com/security/notices/USN-6407-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6407-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-6407-1
Related
Published
2023-10-03T16:57:57.011747Z
Modified
2023-10-03T16:57:57.011747Z
Summary
libx11 vulnerabilities
Details

Gregory James Duck discovered that libx11 incorrectly handled certain keyboard symbols. If a user were tricked into connecting to a malicious X server, a remote attacker could use this issue to cause libx11 to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2023-43785)

Yair Mizrahi discovered that libx11 incorrectly handled certain malformed XPM image files. If a user were tricked into opening a specially crafted XPM image file, a remote attacker could possibly use this issue to consume memory, leading to a denial of service. (CVE-2023-43786)

Yair Mizrahi discovered that libx11 incorrectly handled certain malformed XPM image files. If a user were tricked into opening a specially crafted XPM image file, a remote attacker could use this issue to cause libx11 to crash, leading to a denial of service, or possibly execute arbitrary code. (CVE-2023-43787)

References

Affected packages

Ubuntu:20.04:LTS / libx11

Package

Name
libx11
Purl
pkg:deb/ubuntu/libx11?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:1.6.9-2ubuntu1.6

Affected versions

2:1.*

2:1.6.8-1
2:1.6.9-2
2:1.6.9-2ubuntu1
2:1.6.9-2ubuntu1.1
2:1.6.9-2ubuntu1.2
2:1.6.9-2ubuntu1.5

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "2:1.6.9-2ubuntu1.6",
            "binary_name": "libx11-6"
        },
        {
            "binary_version": "2:1.6.9-2ubuntu1.6",
            "binary_name": "libx11-6-dbgsym"
        },
        {
            "binary_version": "2:1.6.9-2ubuntu1.6",
            "binary_name": "libx11-6-udeb"
        },
        {
            "binary_version": "2:1.6.9-2ubuntu1.6",
            "binary_name": "libx11-data"
        },
        {
            "binary_version": "2:1.6.9-2ubuntu1.6",
            "binary_name": "libx11-dev"
        },
        {
            "binary_version": "2:1.6.9-2ubuntu1.6",
            "binary_name": "libx11-doc"
        },
        {
            "binary_version": "2:1.6.9-2ubuntu1.6",
            "binary_name": "libx11-xcb-dev"
        },
        {
            "binary_version": "2:1.6.9-2ubuntu1.6",
            "binary_name": "libx11-xcb1"
        },
        {
            "binary_version": "2:1.6.9-2ubuntu1.6",
            "binary_name": "libx11-xcb1-dbgsym"
        }
    ]
}

Ubuntu:22.04:LTS / libx11

Package

Name
libx11
Purl
pkg:deb/ubuntu/libx11?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:1.7.5-1ubuntu0.3

Affected versions

2:1.*

2:1.7.2-1
2:1.7.2-2
2:1.7.2-2build1
2:1.7.5-1
2:1.7.5-1ubuntu0.2

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "2:1.7.5-1ubuntu0.3",
            "binary_name": "libx11-6"
        },
        {
            "binary_version": "2:1.7.5-1ubuntu0.3",
            "binary_name": "libx11-6-dbgsym"
        },
        {
            "binary_version": "2:1.7.5-1ubuntu0.3",
            "binary_name": "libx11-data"
        },
        {
            "binary_version": "2:1.7.5-1ubuntu0.3",
            "binary_name": "libx11-dev"
        },
        {
            "binary_version": "2:1.7.5-1ubuntu0.3",
            "binary_name": "libx11-doc"
        },
        {
            "binary_version": "2:1.7.5-1ubuntu0.3",
            "binary_name": "libx11-xcb-dev"
        },
        {
            "binary_version": "2:1.7.5-1ubuntu0.3",
            "binary_name": "libx11-xcb1"
        },
        {
            "binary_version": "2:1.7.5-1ubuntu0.3",
            "binary_name": "libx11-xcb1-dbgsym"
        }
    ]
}