First published: Tue Nov 07 2023(Updated: )
The libX11 packages contain the core X11 protocol client library.<br>Security Fix(es):<br><li> libX11: InitExt.c can overwrite unintended portions of the Display structure if the extension request leads to a buffer overflow (CVE-2023-3138)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Additional Changes:<br>For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.3 Release Notes linked from the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
libX11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:6497 is classified as moderate.
To fix RHSA-2023:6497, update the libX11 package to the latest version available from your repository.
RHSA-2023:6497 addresses a buffer overflow vulnerability in the libX11 package, specifically in InitExt.c.
The vulnerability affects systems running the Red Hat libX11 package.
Yes, RHSA-2023:6497 is related to CVE-2023-3138.