ALT-BU-2023-7022-1
Branch c10f1 update bulletin.
Closed vulnerabilities
BDU:2021-03393
Уязвимость функции SuggestMgr::leftcommonsubstring компонента suggestmgr.cxx программы для проверки правописания Hunspell, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-16707
Hunspell 1.7.0 has an invalid read operation in SuggestMgr::leftcommonsubstring in suggestmgr.cxx.
Package xorg-xwayland updated to version 23.1.1-alt2 for branch c10f1 in task 333359.
Closed vulnerabilities
BDU:2023-07145
Уязвимость функций XIChangeDeviceProperty (Xi/xiproperty.c) и RRChangeOutputProperty (randr/rrproperty.c) сервера X Window System Xorg-server, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
Modified: 2024-11-21
CVE-2023-5367
A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.
- RHSA-2023:6802
- RHSA-2023:6802
- RHSA-2023:6808
- RHSA-2023:6808
- RHSA-2023:7373
- RHSA-2023:7373
- RHSA-2023:7388
- RHSA-2023:7388
- RHSA-2023:7405
- RHSA-2023:7405
- RHSA-2023:7428
- RHSA-2023:7428
- RHSA-2023:7436
- RHSA-2023:7436
- RHSA-2023:7526
- RHSA-2023:7526
- RHSA-2023:7533
- RHSA-2023:7533
- RHSA-2024:0010
- RHSA-2024:0010
- RHSA-2024:0128
- RHSA-2024:0128
- RHSA-2024:2169
- RHSA-2024:2169
- RHSA-2024:2170
- RHSA-2024:2170
- RHSA-2024:2995
- RHSA-2024:2995
- RHSA-2024:2996
- RHSA-2024:2996
- https://access.redhat.com/security/cve/CVE-2023-5367
- https://access.redhat.com/security/cve/CVE-2023-5367
- RHBZ#2243091
- RHBZ#2243091
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2WS5E7H4A5J3U5YBCTMRPQVGWK5LVH7D/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3RK66CXMXO3PCPDU3GDY5FK4UYHUXQJT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4YBK3I6SETHETBHDETFWM3VSZUQICIDV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AKKIE626TZOOPD533EYN47J4RFNHZVOP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO2Q2NP6R62ZRQQG3XQ4AXUT7J2EKKKY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L2RMNR4235YXZZQ2X7Q4MTOZDMZ7BBQU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SEDJN4VFN57K5POOC7BNVD6L6WUUCSG6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SN6KV4XGQJRVAOSM5C3CWMVAXO53COIP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TJXNI4BXURC2BKPNAHFJK3C5ZETB7PER/
- https://lists.x.org/archives/xorg-announce/2023-October/003430.html
- https://lists.x.org/archives/xorg-announce/2023-October/003430.html
- https://security.gentoo.org/glsa/202401-30
- https://security.netapp.com/advisory/ntap-20231130-0004/
- https://www.debian.org/security/2023/dsa-5534
Package xorg-server updated to version 1.20.14-alt9 for branch c10f1 in task 333359.
Closed vulnerabilities
BDU:2023-07145
Уязвимость функций XIChangeDeviceProperty (Xi/xiproperty.c) и RRChangeOutputProperty (randr/rrproperty.c) сервера X Window System Xorg-server, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
BDU:2023-07412
Уязвимость функции DestroyWindow пакета xorg-x11-server позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2023-5367
A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.
- RHSA-2023:6802
- RHSA-2023:6802
- RHSA-2023:6808
- RHSA-2023:6808
- RHSA-2023:7373
- RHSA-2023:7373
- RHSA-2023:7388
- RHSA-2023:7388
- RHSA-2023:7405
- RHSA-2023:7405
- RHSA-2023:7428
- RHSA-2023:7428
- RHSA-2023:7436
- RHSA-2023:7436
- RHSA-2023:7526
- RHSA-2023:7526
- RHSA-2023:7533
- RHSA-2023:7533
- RHSA-2024:0010
- RHSA-2024:0010
- RHSA-2024:0128
- RHSA-2024:0128
- RHSA-2024:2169
- RHSA-2024:2169
- RHSA-2024:2170
- RHSA-2024:2170
- RHSA-2024:2995
- RHSA-2024:2995
- RHSA-2024:2996
- RHSA-2024:2996
- https://access.redhat.com/security/cve/CVE-2023-5367
- https://access.redhat.com/security/cve/CVE-2023-5367
- RHBZ#2243091
- RHBZ#2243091
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2WS5E7H4A5J3U5YBCTMRPQVGWK5LVH7D/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3RK66CXMXO3PCPDU3GDY5FK4UYHUXQJT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4YBK3I6SETHETBHDETFWM3VSZUQICIDV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AKKIE626TZOOPD533EYN47J4RFNHZVOP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO2Q2NP6R62ZRQQG3XQ4AXUT7J2EKKKY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L2RMNR4235YXZZQ2X7Q4MTOZDMZ7BBQU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SEDJN4VFN57K5POOC7BNVD6L6WUUCSG6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SN6KV4XGQJRVAOSM5C3CWMVAXO53COIP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TJXNI4BXURC2BKPNAHFJK3C5ZETB7PER/
- https://lists.x.org/archives/xorg-announce/2023-October/003430.html
- https://lists.x.org/archives/xorg-announce/2023-October/003430.html
- https://security.gentoo.org/glsa/202401-30
- https://security.netapp.com/advisory/ntap-20231130-0004/
- https://www.debian.org/security/2023/dsa-5534
Modified: 2024-11-21
CVE-2023-5380
A use-after-free flaw was found in the xorg-x11-server. An X server crash may occur in a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode) if the pointer is warped from within a window on one screen to the root window of the other screen and if the original window is destroyed followed by another window being destroyed.
- RHSA-2023:7428
- RHSA-2023:7428
- RHSA-2024:2169
- RHSA-2024:2169
- RHSA-2024:2298
- RHSA-2024:2298
- RHSA-2024:2995
- RHSA-2024:2995
- RHSA-2024:3067
- RHSA-2024:3067
- https://access.redhat.com/security/cve/CVE-2023-5380
- https://access.redhat.com/security/cve/CVE-2023-5380
- RHBZ#2244736
- RHBZ#2244736
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2WS5E7H4A5J3U5YBCTMRPQVGWK5LVH7D/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3RK66CXMXO3PCPDU3GDY5FK4UYHUXQJT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AKKIE626TZOOPD533EYN47J4RFNHZVOP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO2Q2NP6R62ZRQQG3XQ4AXUT7J2EKKKY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SN6KV4XGQJRVAOSM5C3CWMVAXO53COIP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TJXNI4BXURC2BKPNAHFJK3C5ZETB7PER/
- https://lists.x.org/archives/xorg-announce/2023-October/003430.html
- https://lists.x.org/archives/xorg-announce/2023-October/003430.html
- https://security.gentoo.org/glsa/202401-30
- https://security.netapp.com/advisory/ntap-20231130-0004/
- https://www.debian.org/security/2023/dsa-5534