vulnerability
Arch Linux: Arbitrary code execution (CVE-2017-13723)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:N/C:P/I:P/A:P) | Oct 9, 2017 | Jul 11, 2025 | Nov 27, 2025 |
Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
Oct 9, 2017
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
A stack buffer overflow was found in xkbtext.c, which didn't handle xkb formatted string output safely due to a single shared static buffer. The fix introduces a ring of resizable buffers to avoid problems when strings end up longer than anticipated.
This vulnerability may potentially lead to privilege escalation when the xorg-server is running with root privileges.
This vulnerability may potentially lead to privilege escalation when the xorg-server is running with root privileges.
Solution
arch-linux-upgrade-latest
References
- CVE-2017-13723
- https://attackerkb.com/topics/CVE-2017-13723
- URL-http://www.debian.org/security/2017/dsa-4000
- URL-http://www.openwall.com/lists/oss-security/2017/10/04/10
- URL-http://www.securityfocus.com/bid/101253
- URL-https://cgit.freedesktop.org/xorg/xserver/commit/?id=94f11ca5cf011ef123bd222cabeaef6f424d76ac
- URL-https://lists.debian.org/debian-lts-announce/2017/11/msg00032.html
- URL-https://lists.x.org/archives/xorg-announce/2017-October/002808.html
- URL-https://security.archlinux.org/ASA-201710-10
- URL-https://security.gentoo.org/glsa/201710-30
- CWE-119
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.