A vulnerability was found in libX11 due to an integer overflow within the XCreateImage() function. This flaw allows a local user to trigger an integer overflow and execute arbitrary code with elevated privileges.
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
Name | Vendor | Start Version | End Version |
---|---|---|---|
Libx11 | X.org | * | 1.8.7 (excluding) |
Red Hat Enterprise Linux 8 | RedHat | libX11-0:1.6.8-8.el8 | * |
Red Hat Enterprise Linux 9 | RedHat | libX11-0:1.7.0-9.el9 | * |
Libx11 | Ubuntu | bionic | * |
Libx11 | Ubuntu | devel | * |
Libx11 | Ubuntu | esm-infra/bionic | * |
Libx11 | Ubuntu | esm-infra/xenial | * |
Libx11 | Ubuntu | focal | * |
Libx11 | Ubuntu | jammy | * |
Libx11 | Ubuntu | lunar | * |
Libx11 | Ubuntu | mantic | * |
Libx11 | Ubuntu | noble | * |
Libx11 | Ubuntu | oracular | * |
Libx11 | Ubuntu | trusty | * |
Libx11 | Ubuntu | trusty/esm | * |
Libx11 | Ubuntu | upstream | * |
Libx11 | Ubuntu | xenial | * |
Libxpm | Ubuntu | bionic | * |
Libxpm | Ubuntu | devel | * |
Libxpm | Ubuntu | esm-infra/bionic | * |
Libxpm | Ubuntu | esm-infra/xenial | * |
Libxpm | Ubuntu | focal | * |
Libxpm | Ubuntu | jammy | * |
Libxpm | Ubuntu | lunar | * |
Libxpm | Ubuntu | mantic | * |
Libxpm | Ubuntu | noble | * |
Libxpm | Ubuntu | oracular | * |
Libxpm | Ubuntu | trusty | * |
Libxpm | Ubuntu | trusty/esm | * |
Libxpm | Ubuntu | upstream | * |
Libxpm | Ubuntu | xenial | * |
Motif | Ubuntu | bionic | * |
Motif | Ubuntu | lunar | * |
Motif | Ubuntu | mantic | * |
Motif | Ubuntu | trusty | * |
Motif | Ubuntu | trusty/esm | * |
Motif | Ubuntu | xenial | * |