DSA-5433-1 libx11 -- security update

Related Vulnerabilities: CVE-2023-3138  

Gregory James Duck reported that missing input validation in various functions provided by libx11, the X11 client-side library, may result in denial of service. For the oldstable distribution (bullseye), this problem has been fixed in version 2:1.7.2-1+deb11u1. For the stable distribution (bookworm), this problem has been fixed in version 2:1.8.4-2+deb12u1. We recommend that you upgrade your libx11 packages. For the detailed security status of libx11 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libx11

Debian Security Advisory

DSA-5433-1 libx11 -- security update

Date Reported:
21 Jun 2023
Affected Packages:
libx11
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 1038133.
In Mitre's CVE dictionary: CVE-2023-3138.
More information:

Gregory James Duck reported that missing input validation in various functions provided by libx11, the X11 client-side library, may result in denial of service.

For the oldstable distribution (bullseye), this problem has been fixed in version 2:1.7.2-1+deb11u1.

For the stable distribution (bookworm), this problem has been fixed in version 2:1.8.4-2+deb12u1.

We recommend that you upgrade your libx11 packages.

For the detailed security status of libx11 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libx11