MGASA-2021-0219

Source
https://advisories.mageia.org/MGASA-2021-0219.html
Import Source
https://advisories.mageia.org/MGASA-2021-0219.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2021-0219
Related
Published
2021-05-23T01:30:51Z
Modified
2021-05-23T00:24:48Z
Summary
Updated libx11 packages fix a security vulnerability
Details

XLookupColor() and other X libraries function lack proper validation of the length of their string parameters. If those parameters can be controlled by an external application (for instance a color name that can be emitted via a terminal control sequence) it can lead to the emission of extra X protocol requests to the X server (CVE-2021-31535).

References
Credits

Affected packages

Mageia:8 / libx11

Package

Name
libx11
Purl
pkg:rpm/mageia/libx11?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.7.0-1.1.mga8

Ecosystem specific

{
    "section": "core"
}

Mageia:7 / libx11

Package

Name
libx11
Purl
pkg:rpm/mageia/libx11?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.12-1.1.mga7

Ecosystem specific

{
    "section": "core"
}