USN-6407-2: libx11 vulnerabilities
10 October 2023
Several security issues were fixed in libx11.
Releases
Packages
- libx11 - X11 client-side library
Details
USN-6407-1 fixed several vulnerabilities in libx11. This update provides
the corresponding update for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.
Original advisory details:
Gregory James Duck discovered that libx11 incorrectly handled certain
keyboard symbols. If a user were tricked into connecting to a malicious X
server, a remote attacker could use this issue to cause libx11 to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2023-43785)
Yair Mizrahi discovered that libx11 incorrectly handled certain malformed
XPM image files. If a user were tricked into opening a specially crafted
XPM image file, a remote attacker could possibly use this issue to consume
memory, leading to a denial of service. (CVE-2023-43786)
Yair Mizrahi discovered that libx11 incorrectly handled certain malformed
XPM image files. If a user were tricked into opening a specially crafted
XPM image file, a remote attacker could use this issue to cause libx11 to
crash, leading to a denial of service, or possibly execute arbitrary code.
(CVE-2023-43787)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04
-
libx11-6
-
2:1.6.4-3ubuntu0.4+esm2
Available with Ubuntu Pro
Ubuntu 16.04
-
libx11-6
-
2:1.6.3-1ubuntu2.2+esm4
Available with Ubuntu Pro
Ubuntu 14.04
-
libx11-6
-
2:1.6.2-1ubuntu2.1+esm5
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make all
the necessary changes.
References
Related notices
- USN-6407-1: libx11-data, libx11-6, libx11-xcb1, libx11-dev, libx11-doc, libx11-xcb-dev, libx11
- USN-6408-1: libxpm, libxpm4, xpmutils, libxpm-dev
- USN-6408-2: libxpm, libxpm4, xpmutils, libxpm-dev