First published: Tue Nov 14 2023(Updated: )
The libX11 packages contain the core X11 protocol client library.<br>Security Fix(es):<br><li> libX11: InitExt.c can overwrite unintended portions of the Display structure if the extension request leads to a buffer overflow (CVE-2023-3138)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Additional Changes:<br>For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.9 Release Notes linked from the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
libX11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:7029 is classified as important due to the potential for a buffer overflow vulnerability.
To fix RHSA-2023:7029, update the libX11 package to the latest version provided by Red Hat.
CVE-2023-3138 refers to a buffer overflow vulnerability that can overwrite unintended portions of the Display structure in the libX11 library.
RHSA-2023:7029 affects certain versions of the libX11 package, though specific versions are not listed in the advisory.
There are no specific workarounds mentioned for RHSA-2023:7029, so updating the package is recommended for protection.