Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 04 Oct 2023 14:52:26 +0000
From:      bugzilla-noreply@freebsd.org
To:        x11@FreeBSD.org
Subject:   maintainer-feedback requested: [Bug 274266] x11/libX11: update vulnerable port to 1.8.7
Message-ID:  <bug-274266-7141-qU30zwlz8W@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-274266-7141@https.bugs.freebsd.org/bugzilla/>
References:  <bug-274266-7141@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
Bugzilla Automation <bugzilla@FreeBSD.org> has asked freebsd-x11 (Nobody)
<x11@FreeBSD.org> for maintainer-feedback:
Bug 274266: x11/libX11: update vulnerable port to 1.8.7
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D274266



--- Description ---
X11 has published a security bulletin [1] that exposes the following CVEs in
our x11/libX11 version 1.8.6:

CVE-2023-43785: out-of-bounds memory access in _XkbReadKeySyms()
CVE-2023-43786: stack exhaustion from infinite recursion in PutSubImage()
CVE-2023-43787: Integer overflow in XCreateImage() leading to a heap overfl=
ow

See changelog for a full list of changes in the release [2].

The attached patch bumps the Makefile, distinfo and updates the pkg-plist
according to man pages reorganization.

See also related report #274265 regarding x11/libXpm.

1. https://lists.x.org/archives/xorg/2023-October/061506.html
2.
https://gitlab.freedesktop.org/xorg/lib/libx11/-/compare/libX11-1.8.6...lib=
X11-
1.8.7



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-274266-7141-qU30zwlz8W>