CVE-2023-43789

NameCVE-2023-43789
DescriptionA vulnerability was found in libXpm where a vulnerability exists due to a boundary condition, a local user can trigger an out-of-bounds read error and read contents of memory on the system.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3603-1, DSA-5516-1, ELA-980-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libxpm (PTS)jessie, jessie (lts)1:3.5.12-0+deb8u3fixed
stretch (lts), stretch1:3.5.12-1+deb9u2fixed
buster (security), buster, buster (lts)1:3.5.12-1+deb10u2fixed
bullseye (security), bullseye1:3.5.12-1.1+deb11u1fixed
bookworm (security), bookworm1:3.5.12-1.1+deb12u1fixed
sid, trixie1:3.5.17-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libxpmsourcejessie1:3.5.12-0+deb8u3ELA-980-1
libxpmsourcestretch1:3.5.12-1+deb9u2ELA-980-1
libxpmsourcebuster1:3.5.12-1+deb10u2DLA-3603-1
libxpmsourcebullseye1:3.5.12-1.1+deb11u1DSA-5516-1
libxpmsourcebookworm1:3.5.12-1.1+deb12u1DSA-5516-1
libxpmsource(unstable)1:3.5.17-1

Notes

https://www.openwall.com/lists/oss-security/2023/10/03/1
Fixed by: https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/7e21cb63b9a1ca760a06cc4cd9b19bbc3fcd8f51

Search for package or bug name: Reporting problems