CVE-2023-3138
Summary
| CVE | CVE-2023-3138 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-06-28 21:15:00 UTC |
| Updated | 2023-12-08 19:15:00 UTC |
| Description | A vulnerability was found in libX11. The security flaw occurs because the functions in src/InitExt.c in libX11 do not check that the values provided for the Request, Event, or Error IDs are within the bounds of the arrays that those functions write to, using those IDs as array indexes. They trust that they were called with values provided by an Xserver adhering to the bounds specified in the X11 protocol, as all X servers provided by X.Org do. As the protocol only specifies a single byte for these values, an out-of-bounds value provided by a malicious server (or a malicious proxy-in-the-middle) can only overwrite other portions of the Display structure and not write outside the bounds of the Display structure itself, possibly causing the client to crash with this memory corruption. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| [ANNOUNCE] X.Org Security Advisory: Sub-object overflows in libX11 |
MISC |
lists.x.org |
|
| [ANNOUNCE] libX11 1.8.6 |
MISC |
lists.x.org |
|
| InitExt.c: Add bounds checks for extension request, event, & error codes (304a654a) · Commits · xorg / lib / libX11 · GitLab |
MISC |
gitlab.freedesktop.org |
|
| cve-details |
MISC |
access.redhat.com |
|
| CVE-2023-3138 libX11 Vulnerability in NetApp Products | NetApp Product Security |
|
security.netapp.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 161119 Oracle Enterprise Linux Security Update for libx11 (ELSA-2023-6497)
- 161172 Oracle Enterprise Linux Security Update for libx11 (ELSA-2023-7029)
- 199420 Ubuntu Security Notification for libx11 Vulnerability (USN-6168-1)
- 199557 Ubuntu Security Notification for libx11 Vulnerability (USN-6168-2)
- 242398 Red Hat Update for libx11 (RHSA-2023:6497)
- 242411 Red Hat Update for libx11 (RHSA-2023:7029)
- 243008 Red Hat Update for libx11 (RHSA-2024:1088)
- 243090 Red Hat Update for libx11 (RHSA-2024:1417)
- 284052 Fedora Security Update for libX11 (FEDORA-2023-7503ce855c)
- 355602 Amazon Linux Security Advisory for libX11 : ALAS2-2023-2129
- 355647 Amazon Linux Security Advisory for libX11 : ALAS2023-2023-250
- 355650 Amazon Linux Security Advisory for libX11 : ALAS-2023-1782
- 503032 Alpine Linux Security Update for libx11
- 503033 Alpine Linux Security Update for libx11
- 503034 Alpine Linux Security Update for libx11
- 503116 Alpine Linux Security Update for libx11
- 6000060 Debian Security Update for libx11 (DLA 3472-1)
- 6000180 Debian Security Update for libx11 (DSA 5433-1)
- 673290 EulerOS Security Update for libx11 (EulerOS-SA-2023-2589)
- 673306 EulerOS Security Update for libx11 (EulerOS-SA-2023-2619)
- 673367 EulerOS Security Update for libx11 (EulerOS-SA-2023-3136)
- 673511 EulerOS Security Update for libx11 (EulerOS-SA-2023-2862)
- 673662 EulerOS Security Update for libx11 (EulerOS-SA-2023-2845)
- 673681 EulerOS Security Update for libx11 (EulerOS-SA-2023-2814)
- 673913 EulerOS Security Update for libx11 (EulerOS-SA-2023-2790)
- 691194 Free Berkeley Software Distribution (FreeBSD) Security Update for libx11 (734b8f46-773d-4fef-bed3-61114fe8e4c5)
- 754109 SUSE Enterprise Linux Security Update for libX11 (SUSE-SU-2023:2531-1)
- 754126 SUSE Enterprise Linux Security Update for libX11 (SUSE-SU-2023:2614-1)
- 907081 Common Base Linux Mariner (CBL-Mariner) Security Update for libX11 (27274-1)
- 941347 AlmaLinux Security Update for libX11 (ALSA-2023:6497)
- 941450 AlmaLinux Security Update for libX11 (ALSA-2023:7029)