FreeBSD Bugzilla – Attachment 245438 Details for
Bug 274266
x11/libX11: update vulnerable port to 1.8.7
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
Remember
[x]
|
Forgot Password
Login:
[x]
[patch]
patch for security/vuxml/vuln/2023.xml
vuln-2023.diff (text/plain), 4.31 KB, created by
Piotr Smyrak
on 2023-10-04 17:30:28 UTC
(
hide
)
Description:
patch for security/vuxml/vuln/2023.xml
Filename:
MIME Type:
Creator:
Piotr Smyrak
Created:
2023-10-04 17:30:28 UTC
Size:
4.31 KB
patch
obsolete
>diff --git i/security/vuxml/vuln/2023.xml w/security/vuxml/vuln/2023.xml >index 3b38d51b8144..455665f01c5a 100644 >--- i/security/vuxml/vuln/2023.xml >+++ w/security/vuxml/vuln/2023.xml >@@ -1,3 +1,93 @@ >+ <vuln vid="9be7db66-62d6-11ee-bdcc-d89ef317b2fc"> >+ <topic>x11/libX11 multiple vulnerabilities</topic> >+ <affects> >+ <package> >+ <name>libX11</name> >+ <range><lt>1.8.7</lt></range> >+ </package> >+ </affects> >+ <description> >+ <body xmlns="http://www.w3.org/1999/xhtml"> >+ <p>The X.Org project reports:</p> >+ <blockquote cite="https://lists.x.org/archives/xorg/2023-October/061506.html"> >+ <dl> >+ <dt>CVE-2023-43785: out-of-bounds memory access in _XkbReadKeySyms()</dt> >+ <dd>When libX11 is processing the reply from the X server to the XkbGetMap >+ request, if it detected the number of symbols in the new map was less >+ than the size of the buffer it had allocated, it always added room for >+ 128 more symbols, instead of the actual size needed. While the >+ _XkbReadBufferCopyKeySyms() helper function returned an error if asked >+ to copy more keysyms into the buffer than there was space allocated for, >+ the caller never checked for an error and assumed the full set of keysyms >+ was copied into the buffer and could then try to read out of bounds when >+ accessing the buffer. libX11 1.8.7 has been patched to both fix the size >+ allocated and check for error returns from _XkbReadBufferCopyKeySyms().</dd> >+ <dt>CVE-2023-43786: stack exhaustion in XPutImage</dt> >+ <dd>When splitting a single line of pixels into chunks that fit in a single >+ request (not using the BIG-REQUESTS extension) to send to the X server, >+ the code did not take into account the number of bits per pixel, so would >+ just loop forever finding it needed to send more pixels than fit in the >+ given request size and not breaking them down into a small enough chunk to >+ fit. An XPM file was provided that triggered this bug when loaded via >+ libXpm's XpmReadFileToPixmap() function, which in turn calls XPutImage() >+ and hit this bug.</dd> >+ <dt>CVE-2023-43787: integer overflow in XCreateImage() leading to a heap overflow</dt> >+ <dd>When creating an image, there was no validation that the multiplication >+ of the caller-provided width by the visual's bits_per_pixel did not >+ overflow and thus result in the allocation of a buffer too small to hold >+ the data that would be copied into it. An XPM file was provided that >+ triggered this bug when loaded via libXpm's XpmReadFileToPixmap() function, >+ which in turn calls XCreateImage() and hit this bug.i</dd> >+ </dl> >+ </blockquote> >+ </body> >+ </description> >+ <references> >+ <cvename>CVE-2023-43785</cvename> >+ <cvename>CVE-2023-43786</cvename> >+ <cvename>CVE-2023-43787</cvename> >+ <url>https://lists.x.org/archives/xorg/2023-October/061506.html</url> >+ </references> >+ <dates> >+ <discovery>2023-09-22</discovery> >+ <entry>2023-10-04</entry> >+ </dates> >+ </vuln> >+ >+ <vuln vid="7716bdf0-62d5-11ee-bdcc-d89ef317b2fc"> >+ <topic>x11/libXpm multiple vulnerabilities</topic> >+ <affects> >+ <package> >+ <name>libXpm</name> >+ <range><lt>3.5.17</lt></range> >+ </package> >+ </affects> >+ <description> >+ <body xmlns="http://www.w3.org/1999/xhtml"> >+ <p>The X.Org project reports:</p> >+ <blockquote cite="https://lists.x.org/archives/xorg/2023-October/061506.html"> >+ <dl> >+ <dt>CVE-2023-43788: Out of bounds read in XpmCreateXpmImageFromBuffer</dt> >+ <dd>An out-of-bounds read is located in ParseComment() when reading from >+ a memory buffer instead of a file, as it continued to look for the >+ closing comment marker past the end of the buffer.</dd> >+ <dt>CVE-2023-43789: Out of bounds read on XPM with corrupted colormap</dt> >+ <dd>A corrupted colormap section may cause libXpm to read out of bounds.</dd> >+ </dl> >+ </blockquote> >+ </body> >+ </description> >+ <references> >+ <cvename>CVE-2023-43788</cvename> >+ <cvename>CVE-2023-43789</cvename> >+ <url>https://lists.x.org/archives/xorg/2023-October/061506.html</url> >+ </references> >+ <dates> >+ <discovery>2023-09-22</discovery> >+ <entry>2023-10-04</entry> >+ </dates> >+ </vuln> >+ > <vuln vid="4e45c45b-629e-11ee-8290-a8a1599412c6"> > <topic>chromium -- type confusion in v8</topic> > <affects>
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Diff
View Attachment As Raw
Actions:
View
|
Diff
Attachments on
bug 274266
:
245436
|
245437
| 245438