CVE-2023-3138

Summary

CVECVE-2023-3138
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2023-06-28 21:15:00 UTC
Updated2023-12-08 19:15:00 UTC
DescriptionA vulnerability was found in libX11. The security flaw occurs because the functions in src/InitExt.c in libX11 do not check that the values provided for the Request, Event, or Error IDs are within the bounds of the arrays that those functions write to, using those IDs as array indexes. They trust that they were called with values provided by an Xserver adhering to the bounds specified in the X11 protocol, as all X servers provided by X.Org do. As the protocol only specifies a single byte for these values, an out-of-bounds value provided by a malicious server (or a malicious proxy-in-the-middle) can only overwrite other portions of the Display structure and not write outside the bounds of the Display structure itself, possibly causing the client to crash with this memory corruption.

Risk And Classification

Problem Types: CWE-787

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Redhat Enterprise Linux 8.0 All All All
Operating System Redhat Enterprise Linux 9.0 All All All
Application X.org Libx11 All All All All

References

ReferenceSourceLinkTags
[ANNOUNCE] X.Org Security Advisory: Sub-object overflows in libX11 MISC lists.x.org
[ANNOUNCE] libX11 1.8.6 MISC lists.x.org
InitExt.c: Add bounds checks for extension request, event, & error codes (304a654a) · Commits · xorg / lib / libX11 · GitLab MISC gitlab.freedesktop.org
cve-details MISC access.redhat.com
CVE-2023-3138 libX11 Vulnerability in NetApp Products | NetApp Product Security security.netapp.com
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 161119 Oracle Enterprise Linux Security Update for libx11 (ELSA-2023-6497)
  • 161172 Oracle Enterprise Linux Security Update for libx11 (ELSA-2023-7029)
  • 199420 Ubuntu Security Notification for libx11 Vulnerability (USN-6168-1)
  • 199557 Ubuntu Security Notification for libx11 Vulnerability (USN-6168-2)
  • 242398 Red Hat Update for libx11 (RHSA-2023:6497)
  • 242411 Red Hat Update for libx11 (RHSA-2023:7029)
  • 243008 Red Hat Update for libx11 (RHSA-2024:1088)
  • 243090 Red Hat Update for libx11 (RHSA-2024:1417)
  • 284052 Fedora Security Update for libX11 (FEDORA-2023-7503ce855c)
  • 355602 Amazon Linux Security Advisory for libX11 : ALAS2-2023-2129
  • 355647 Amazon Linux Security Advisory for libX11 : ALAS2023-2023-250
  • 355650 Amazon Linux Security Advisory for libX11 : ALAS-2023-1782
  • 503032 Alpine Linux Security Update for libx11
  • 503033 Alpine Linux Security Update for libx11
  • 503034 Alpine Linux Security Update for libx11
  • 503116 Alpine Linux Security Update for libx11
  • 6000060 Debian Security Update for libx11 (DLA 3472-1)
  • 6000180 Debian Security Update for libx11 (DSA 5433-1)
  • 673290 EulerOS Security Update for libx11 (EulerOS-SA-2023-2589)
  • 673306 EulerOS Security Update for libx11 (EulerOS-SA-2023-2619)
  • 673367 EulerOS Security Update for libx11 (EulerOS-SA-2023-3136)
  • 673511 EulerOS Security Update for libx11 (EulerOS-SA-2023-2862)
  • 673662 EulerOS Security Update for libx11 (EulerOS-SA-2023-2845)
  • 673681 EulerOS Security Update for libx11 (EulerOS-SA-2023-2814)
  • 673913 EulerOS Security Update for libx11 (EulerOS-SA-2023-2790)
  • 691194 Free Berkeley Software Distribution (FreeBSD) Security Update for libx11 (734b8f46-773d-4fef-bed3-61114fe8e4c5)
  • 754109 SUSE Enterprise Linux Security Update for libX11 (SUSE-SU-2023:2531-1)
  • 754126 SUSE Enterprise Linux Security Update for libX11 (SUSE-SU-2023:2614-1)
  • 907081 Common Base Linux Mariner (CBL-Mariner) Security Update for libX11 (27274-1)
  • 941347 AlmaLinux Security Update for libX11 (ALSA-2023:6497)
  • 941450 AlmaLinux Security Update for libX11 (ALSA-2023:7029)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report