Red Hat Security Advisory 2023-7029-01 - An update for libX11 is now available for Red Hat Enterprise Linux 8. Issues addressed include a buffer overflow vulnerability.
447164a193df5540fd8b76b86bd489e01cb94e26da736efe2a8fc6df793ec2db
Red Hat Security Advisory 2023-6497-01 - An update for libX11 is now available for Red Hat Enterprise Linux 9. Issues addressed include a buffer overflow vulnerability.
0d211b39acba6895c476f4fef45f1daf9511ddb2ef337703181beaab2e8c3a67
Debian Linux Security Advisory 5433-1 - Gregory James Duck reported that missing input validation in various functions provided by libx11, the X11 client-side library, may result in denial of service.
99cc65c1ad12a278a4a4e25bf0b90ba31d13ff5fd3f7e054cbc9ea208033a4a4
Ubuntu Security Notice 6168-2 - USN-6168-1 fixed a vulnerability in libx11. This update provides the corresponding update for Ubuntu 14.04 ESM, Ubuntu 16.04 ESM, and Ubuntu 18.04 ESM. Gregory James Duck discovered that libx11 incorrectly handled certain Request, Event, or Error IDs. If a user were tricked into connecting to a malicious X Server, a remote attacker could possibly use this issue to cause libx11 to crash, resulting in a denial of service.
cfbed00d12ce5e17e808411a3087316dc771868a1016244059c6b0aef5d4d9c7
Ubuntu Security Notice 6168-1 - Gregory James Duck discovered that libx11 incorrectly handled certain Request, Event, or Error IDs. If a user were tricked into connecting to a malicious X Server, a remote attacker could possibly use this issue to cause libx11 to crash, resulting in a denial of service.
fb33b3eca8869ce783b685384acb922fd56dd96e3d27a63f58e05c1b89544187