Bug 2163813 (CVE-2023-24039)
Summary: | CVE-2023-24039 motif: libXm: stack-based buffer overflow in ParseColors() | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Mauro Matteo Cascella <mcascell> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | csoriano, peter.hutterer |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw was found in libXm, a library distributed by the motif package. A specially crafted XPM file with long color strings can lead to a stack-based buffer overflow in the ParseColors function due to the unsafe use of the strcat function, resulting in privilege escalation.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2023-01-27 20:22:20 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2163814 | ||
Bug Blocks: | 2164418 |
Description
Mauro Matteo Cascella
2023-01-24 13:34:06 UTC
Created libXpm tracking bugs for this issue: Affects: fedora-all [bug 2163814] Note that this issue is in libXm (i.e. motif), not libXpm the X11 Pixmap library. This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2023-24039 |