Dismissed
Permalink
CVE-2023-43786
5.5 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): REQUIRED
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
by @LeSuisse Activity log
- Created automatic suggestion
-
@LeSuisse
removed
4 packages
- xorg.libX11
- tests.pkg-config.defaultPkgConfigPackages.x11
- xorg.libXpm
- tests.pkg-config.defaultPkgConfigPackages.xpm
- @LeSuisse dismissed
Libx11: stack exhaustion from infinite recursion in putsubimage()
A vulnerability was found in libX11 due to an infinite loop within the PutSubImage() function. This flaw allows a local user to consume all available system resources and cause a denial of service condition.
References
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj…
- https://security.netapp.com/advisory/ntap-20231103-0006/
- https://access.redhat.com/security/cve/CVE-2023-43786 x_refsource_REDHAT vdb-entry
- RHBZ#2242253 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2023-43786 x_refsource_REDHAT vdb-entry
- RHBZ#2242253 issue-tracking x_refsource_REDHAT
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj…
- https://security.netapp.com/advisory/ntap-20231103-0006/
- https://access.redhat.com/security/cve/CVE-2023-43786 x_refsource_REDHAT vdb-entry
- RHBZ#2242253 issue-tracking x_refsource_REDHAT
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj…
- https://security.netapp.com/advisory/ntap-20231103-0006/
- http://www.openwall.com/lists/oss-security/2024/01/24/9
- http://www.openwall.com/lists/oss-security/2024/01/24/9
- https://access.redhat.com/security/cve/CVE-2023-43786 x_refsource_REDHAT vdb-entry
- RHBZ#2242253 issue-tracking x_refsource_REDHAT
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj…
- https://security.netapp.com/advisory/ntap-20231103-0006/
- http://www.openwall.com/lists/oss-security/2024/01/24/9
- RHSA-2024:2145 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-43786 x_refsource_REDHAT vdb-entry
- RHBZ#2242253 issue-tracking x_refsource_REDHAT
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj…
- https://security.netapp.com/advisory/ntap-20231103-0006/
- http://www.openwall.com/lists/oss-security/2024/01/24/9
- RHSA-2024:2145 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-43786 x_refsource_REDHAT vdb-entry
- RHBZ#2242253 issue-tracking x_refsource_REDHAT
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj…
- https://security.netapp.com/advisory/ntap-20231103-0006/
- http://www.openwall.com/lists/oss-security/2024/01/24/9
- RHSA-2024:2145 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2973 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-43786 x_refsource_REDHAT vdb-entry
- RHBZ#2242253 issue-tracking x_refsource_REDHAT
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj…
- https://security.netapp.com/advisory/ntap-20231103-0006/
- http://www.openwall.com/lists/oss-security/2024/01/24/9
- RHSA-2024:2145 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2973 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-43786 x_refsource_REDHAT vdb-entry
- RHBZ#2242253 issue-tracking x_refsource_REDHAT
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj…
- https://security.netapp.com/advisory/ntap-20231103-0006/
- http://www.openwall.com/lists/oss-security/2024/01/24/9
- RHSA-2024:2145 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2973 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-43786 x_refsource_REDHAT vdb-entry
- RHBZ#2242253 issue-tracking x_refsource_REDHAT
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj…
- https://security.netapp.com/advisory/ntap-20231103-0006/
- RHBZ#2242253 issue-tracking x_refsource_REDHAT x_transferred
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj… x_transferred
- https://security.netapp.com/advisory/ntap-20231103-0006/ x_transferred
- http://www.openwall.com/lists/oss-security/2024/01/24/9 x_transferred
- RHSA-2024:2145 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:2973 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2023-43786 x_refsource_REDHAT vdb-entry x_transferred
- https://access.redhat.com/security/cve/CVE-2023-43786 x_refsource_REDHAT vdb-entry
- RHBZ#2242253 issue-tracking x_refsource_REDHAT
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj…
- https://security.netapp.com/advisory/ntap-20231103-0006/
- http://www.openwall.com/lists/oss-security/2024/01/24/9
- RHSA-2024:2145 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2973 x_refsource_REDHAT vendor-advisory
- http://www.openwall.com/lists/oss-security/2024/01/24/9 x_transferred
- RHSA-2024:2145 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:2973 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2023-43786 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2242253 issue-tracking x_refsource_REDHAT x_transferred
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj… x_transferred
- https://security.netapp.com/advisory/ntap-20231103-0006/ x_transferred
- http://www.openwall.com/lists/oss-security/2024/01/24/9
- RHSA-2024:2145 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2973 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-43786 x_refsource_REDHAT vdb-entry
- RHBZ#2242253 issue-tracking x_refsource_REDHAT
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj…
- https://security.netapp.com/advisory/ntap-20231103-0006/
- http://www.openwall.com/lists/oss-security/2024/01/24/9 x_transferred
- RHSA-2024:2145 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:2973 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2023-43786 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2242253 issue-tracking x_refsource_REDHAT x_transferred
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj… x_transferred
- https://security.netapp.com/advisory/ntap-20231103-0006/ x_transferred
- RHSA-2024:2145 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2973 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-43786 x_refsource_REDHAT vdb-entry
- RHBZ#2242253 issue-tracking x_refsource_REDHAT
- http://www.openwall.com/lists/oss-security/2024/01/24/9 x_transferred
- RHSA-2024:2145 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:2973 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2023-43786 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2242253 issue-tracking x_refsource_REDHAT x_transferred
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj… x_transferred
- https://security.netapp.com/advisory/ntap-20231103-0006/ x_transferred
- RHBZ#2242253 issue-tracking x_refsource_REDHAT
- RHSA-2024:2145 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2973 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-43786 x_refsource_REDHAT vdb-entry
- http://www.openwall.com/lists/oss-security/2024/01/24/9 x_transferred
- RHSA-2024:2145 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:2973 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2023-43786 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2242253 issue-tracking x_refsource_REDHAT x_transferred
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj… x_transferred
- https://security.netapp.com/advisory/ntap-20231103-0006/ x_transferred
- RHSA-2024:2145 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2973 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-43786 x_refsource_REDHAT vdb-entry
- RHBZ#2242253 issue-tracking x_refsource_REDHAT
- http://www.openwall.com/lists/oss-security/2024/01/24/9 x_transferred
- RHSA-2024:2145 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:2973 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2023-43786 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2242253 issue-tracking x_refsource_REDHAT x_transferred
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj… x_transferred
- https://security.netapp.com/advisory/ntap-20231103-0006/ x_transferred
- RHSA-2024:2973 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-43786 x_refsource_REDHAT vdb-entry
- RHBZ#2242253 issue-tracking x_refsource_REDHAT
- RHSA-2024:2145 x_refsource_REDHAT vendor-advisory
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj… x_transferred
- https://security.netapp.com/advisory/ntap-20231103-0006/ x_transferred
- http://www.openwall.com/lists/oss-security/2024/01/24/9 x_transferred
- RHSA-2024:2145 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:2973 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2023-43786 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2242253 issue-tracking x_refsource_REDHAT x_transferred
- RHSA-2024:2145 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2973 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-43786 x_refsource_REDHAT vdb-entry
- RHBZ#2242253 issue-tracking x_refsource_REDHAT
- RHBZ#2242253 issue-tracking x_refsource_REDHAT x_transferred
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj… x_transferred
- https://security.netapp.com/advisory/ntap-20231103-0006/ x_transferred
- https://lists.debian.org/debian-lts-announce/2023/10/msg00005.html
- http://www.openwall.com/lists/oss-security/2024/01/24/9 x_transferred
- RHSA-2024:2145 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:2973 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2023-43786 x_refsource_REDHAT vdb-entry x_transferred
- RHSA-2024:2145 x_refsource_REDHAT vendor-advisory
- RHSA-2024:2973 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2023-43786 x_refsource_REDHAT vdb-entry
- RHBZ#2242253 issue-tracking x_refsource_REDHAT
- http://www.openwall.com/lists/oss-security/2024/01/24/9 x_transferred
- RHSA-2024:2145 x_refsource_REDHAT vendor-advisory x_transferred
- RHSA-2024:2973 x_refsource_REDHAT vendor-advisory x_transferred
- https://access.redhat.com/security/cve/CVE-2023-43786 x_refsource_REDHAT vdb-entry x_transferred
- RHBZ#2242253 issue-tracking x_refsource_REDHAT x_transferred
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj… x_transferred
- https://security.netapp.com/advisory/ntap-20231103-0006/ x_transferred
- https://lists.debian.org/debian-lts-announce/2023/10/msg00005.html
Affected products
libX11
- ==1.8.7
- *
libXpm
- <3.5.17