ALT-PU-2024-3261-3
Package xorg-server updated to version 1.20.8-alt12 for branch c9f2 in task 341756.
Closed vulnerabilities
BDU:2021-00126
Уязвимость функции SProcRecordQueryVersion сервера X Window System Xorg-server, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-02598
Уязвимость функции XkbSetNamesCheck из xkb.c сервера X Window System Xorg-server, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании
BDU:2022-00346
Уязвимость функции SProcXFixesCreatePointerBarrier реализации сервера X Window System X.Org Server, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-00347
Уязвимость функции SProcXFixesCreatePointerBarrier реализации сервера X Window System X.Org Server, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-00348
Уязвимость функции SProcRenderCompositeGlyphs реализации сервера X Window System X.Org Server, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-00349
Уязвимость функции SwapCreateRegister реализации сервера X Window System X.Org Server, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-04748
Уязвимость обработчика вызовов ProcXkbSetGeometry сервера X.Org Server, позволяющая нарушителю выполнить произвольный код или повысить свои привилегии
BDU:2022-04749
Уязвимость обработчика вызовов ProcXkbSetDeviceInfo сервера X.Org Server, позволяющая нарушителю выполнить произвольный код или повысить свои привилегии
BDU:2023-00910
Уязвимость функций ProcXkbSetDeviceInfo() и ProcXkbGetDeviceInfo() программного пакета X.Org Server, связанная с использованием памяти после ее освобождения, позволяющая нарушителю выполнить произвольный код
BDU:2023-02146
Уязвимость программного пакета X.Org Server, связанная с использованием памяти после ее освобождения, позволяющая нарушителю повысить свои привилегии
BDU:2023-07145
Уязвимость функций XIChangeDeviceProperty (Xi/xiproperty.c) и RRChangeOutputProperty (randr/rrproperty.c) сервера X Window System Xorg-server, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
BDU:2023-07412
Уязвимость функции DestroyWindow пакета xorg-x11-server позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-07834
Уязвимость функции XkbCopyNames реализации протокола Wayland для X.Org XWayland, реализации сервера X Window System X.Org Server, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2023-07835
Уязвимость функции XTestSwapFakeInput реализации сервера X Window System X.Org Server, реализации протокола Wayland для X.Org XWayland, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2023-07836
Уязвимость функции ProcXIPassiveUngrabDevice реализации протокола Wayland для X.Org XWayland, реализации сервера X Window System X.Org Server, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2023-07837
Уязвимость функции XvdiSelectVideoNotify реализации сервера X Window System X.Org Server, реализации протокола Wayland для X.Org XWayland, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2023-07838
Уязвимость функции ScreenSaverSetAttributes реализации сервера X Window System X.Org Server, реализации протокола Wayland для X.Org XWayland, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2023-07839
Уязвимость функций ProcXIChangeProperty и ProcXChangeDeviceProperty реализации сервера X Window System X.Org Server, реализации протокола Wayland для X.Org XWayland, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2024-00405
Уязвимость функций DeviceFocusEvent и XIQueryPointer реализации сервера X Window System X.Org Server, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2024-00457
Уязвимость пакета xorg-x11-server, связанная с использованием памяти после её освобождения при обработке объектов Button Action, позволяющая повысить свои привилегии и выполнить произвольный код в контексте root
BDU:2024-00638
Уязвимость компонента GLX PBuffer Handler реализации сервера X Window System X.Org Server, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-00639
Уязвимость компонента Privates Handler реализации сервера X Window System X.Org Server, позволяющая нарушителю выполнить произвольный код
BDU:2024-00667
Уязвимость функции XISendDeviceHierarchyEvent реализации протокола Wayland для X.Org XWayland, реализации сервера X Window System X.Org Server, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2024-00675
Уязвимость функции DisableDevice реализации протокола Wayland для X.Org XWayland, реализации сервера X Window System X.Org Server, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2024-00676
Уязвимость реализации протокола Wayland для X.Org XWayland, реализации сервера X Window System X.Org Server, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2024-11-21
CVE-2020-14345
A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Out-Of-Bounds access in XkbSetNames function may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
- [oss-security] 20210115 Re: [vs] Cinnamon lock screen bypass in multiple distributions
- [oss-security] 20210115 Re: [vs] Cinnamon lock screen bypass in multiple distributions
- https://bugzilla.redhat.com/show_bug.cgi?id=1862241
- https://bugzilla.redhat.com/show_bug.cgi?id=1862241
- https://lists.x.org/archives/xorg-announce/2020-August/003058.html
- https://lists.x.org/archives/xorg-announce/2020-August/003058.html
- GLSA-202012-01
- GLSA-202012-01
- USN-4488-2
- USN-4488-2
- USN-4490-1
- USN-4490-1
- https://www.zerodayinitiative.com/advisories/ZDI-20-1416/
- https://www.zerodayinitiative.com/advisories/ZDI-20-1416/
Modified: 2024-11-21
CVE-2020-14362
A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Integer underflow leading to heap-buffer overflow may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=1869144
- https://bugzilla.redhat.com/show_bug.cgi?id=1869144
- https://lists.x.org/archives/xorg-announce/2020-August/003058.html
- https://lists.x.org/archives/xorg-announce/2020-August/003058.html
- GLSA-202012-01
- GLSA-202012-01
- USN-4488-2
- USN-4488-2
- https://www.zerodayinitiative.com/advisories/ZDI-20-1419/
- https://www.zerodayinitiative.com/advisories/ZDI-20-1419/
Modified: 2024-11-21
CVE-2021-4008
A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcRenderCompositeGlyphs function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
- [debian-lts-announce] 20211229 [SECURITY] [DLA 2869-1] xorg-server security update
- [debian-lts-announce] 20211229 [SECURITY] [DLA 2869-1] xorg-server security update
- FEDORA-2021-69e96c8f68
- FEDORA-2021-69e96c8f68
- FEDORA-2021-664a6554a1
- FEDORA-2021-664a6554a1
- FEDORA-2021-2eb603951b
- FEDORA-2021-2eb603951b
- FEDORA-2021-a7fd510294
- FEDORA-2021-a7fd510294
- https://lists.x.org/archives/xorg-announce/2021-December/003122.html
- https://lists.x.org/archives/xorg-announce/2021-December/003122.html
- https://lists.x.org/archives/xorg-announce/2021-December/003124.html
- https://lists.x.org/archives/xorg-announce/2021-December/003124.html
- GLSA-202305-30
- GLSA-202305-30
- https://security.netapp.com/advisory/ntap-20220114-0004/
- https://security.netapp.com/advisory/ntap-20220114-0004/
- DSA-5027
- DSA-5027
- https://www.zerodayinitiative.com/advisories/ZDI-21-1547/
- https://www.zerodayinitiative.com/advisories/ZDI-21-1547/
Modified: 2024-11-21
CVE-2021-4009
A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcXFixesCreatePointerBarrier function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
- [debian-lts-announce] 20211229 [SECURITY] [DLA 2869-1] xorg-server security update
- [debian-lts-announce] 20211229 [SECURITY] [DLA 2869-1] xorg-server security update
- FEDORA-2021-69e96c8f68
- FEDORA-2021-69e96c8f68
- FEDORA-2021-664a6554a1
- FEDORA-2021-664a6554a1
- FEDORA-2021-2eb603951b
- FEDORA-2021-2eb603951b
- FEDORA-2021-a7fd510294
- FEDORA-2021-a7fd510294
- https://lists.x.org/archives/xorg-announce/2021-December/003122.html
- https://lists.x.org/archives/xorg-announce/2021-December/003122.html
- https://lists.x.org/archives/xorg-announce/2021-December/003124.html
- https://lists.x.org/archives/xorg-announce/2021-December/003124.html
- GLSA-202305-30
- GLSA-202305-30
- https://security.netapp.com/advisory/ntap-20220114-0004/
- https://security.netapp.com/advisory/ntap-20220114-0004/
- DSA-5027
- DSA-5027
- https://www.zerodayinitiative.com/advisories/ZDI-21-1548/
- https://www.zerodayinitiative.com/advisories/ZDI-21-1548/
Modified: 2024-11-21
CVE-2021-4010
A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcScreenSaverSuspend function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
- FEDORA-2021-69e96c8f68
- FEDORA-2021-69e96c8f68
- FEDORA-2021-664a6554a1
- FEDORA-2021-664a6554a1
- FEDORA-2021-2eb603951b
- FEDORA-2021-2eb603951b
- FEDORA-2021-a7fd510294
- FEDORA-2021-a7fd510294
- https://lists.x.org/archives/xorg-announce/2021-December/003122.html
- https://lists.x.org/archives/xorg-announce/2021-December/003122.html
- https://lists.x.org/archives/xorg-announce/2021-December/003124.html
- https://lists.x.org/archives/xorg-announce/2021-December/003124.html
- GLSA-202305-30
- GLSA-202305-30
- https://security.netapp.com/advisory/ntap-20220114-0004/
- https://security.netapp.com/advisory/ntap-20220114-0004/
- DSA-5027
- DSA-5027
- https://www.zerodayinitiative.com/advisories/ZDI-21-1549/
- https://www.zerodayinitiative.com/advisories/ZDI-21-1549/
Modified: 2024-11-21
CVE-2021-4011
A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SwapCreateRegister function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
- [debian-lts-announce] 20211229 [SECURITY] [DLA 2869-1] xorg-server security update
- [debian-lts-announce] 20211229 [SECURITY] [DLA 2869-1] xorg-server security update
- FEDORA-2021-69e96c8f68
- FEDORA-2021-69e96c8f68
- FEDORA-2021-664a6554a1
- FEDORA-2021-664a6554a1
- FEDORA-2021-2eb603951b
- FEDORA-2021-2eb603951b
- FEDORA-2021-a7fd510294
- FEDORA-2021-a7fd510294
- https://lists.x.org/archives/xorg-announce/2021-December/003122.html
- https://lists.x.org/archives/xorg-announce/2021-December/003122.html
- https://lists.x.org/archives/xorg-announce/2021-December/003124.html
- https://lists.x.org/archives/xorg-announce/2021-December/003124.html
- GLSA-202305-30
- GLSA-202305-30
- https://security.netapp.com/advisory/ntap-20220114-0004/
- https://security.netapp.com/advisory/ntap-20220114-0004/
- DSA-5027
- DSA-5027
- https://www.zerodayinitiative.com/advisories/ZDI-21-1550/
- https://www.zerodayinitiative.com/advisories/ZDI-21-1550/
Modified: 2024-11-21
CVE-2022-2319
A flaw was found in the Xorg-x11-server. An out-of-bounds access issue can occur in the ProcXkbSetGeometry function due to improper validation of the request length.
- https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/938
- https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/938
- https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/939
- https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/939
- https://lists.freedesktop.org/archives/xorg-announce/2022-July/003192.html
- https://lists.freedesktop.org/archives/xorg-announce/2022-July/003192.html
- GLSA-202210-30
- GLSA-202210-30
- https://security.netapp.com/advisory/ntap-20221104-0003/
- https://security.netapp.com/advisory/ntap-20221104-0003/
- https://www.zerodayinitiative.com/advisories/ZDI-22-964/
- https://www.zerodayinitiative.com/advisories/ZDI-22-964/
Modified: 2024-11-21
CVE-2022-2320
A flaw was found in the Xorg-x11-server. The specific flaw exists within the handling of ProcXkbSetDeviceInfo requests. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. This flaw allows an attacker to escalate privileges and execute arbitrary code in the context of root.
- https://github.com/freedesktop/xorg-xserver/commit/dd8caf39e9e15d8f302e54045dd08d8ebf1025dc
- https://github.com/freedesktop/xorg-xserver/commit/dd8caf39e9e15d8f302e54045dd08d8ebf1025dc
- https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/938
- https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/938
- https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/939
- https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/939
- https://lists.freedesktop.org/archives/xorg-announce/2022-July/003192.html
- https://lists.freedesktop.org/archives/xorg-announce/2022-July/003192.html
- GLSA-202210-30
- GLSA-202210-30
- https://security.netapp.com/advisory/ntap-20221104-0003/
- https://security.netapp.com/advisory/ntap-20221104-0003/
- https://www.zerodayinitiative.com/advisories/ZDI-22-963/
- https://www.zerodayinitiative.com/advisories/ZDI-22-963/
Modified: 2024-11-21
CVE-2022-4283
A vulnerability was found in X.Org. This security flaw occurs because the XkbCopyNames function left a dangling pointer to freed memory, resulting in out-of-bounds memory access on subsequent XkbGetKbdByName requests.. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.
- https://access.redhat.com/security/cve/CVE-2022-4283
- https://access.redhat.com/security/cve/CVE-2022-4283
- https://bugzilla.redhat.com/show_bug.cgi?id=2151761
- https://bugzilla.redhat.com/show_bug.cgi?id=2151761
- FEDORA-2022-721a78b7e5
- FEDORA-2022-721a78b7e5
- FEDORA-2022-c3a65f7c65
- FEDORA-2022-c3a65f7c65
- FEDORA-2022-dd3eb7e0a8
- FEDORA-2022-dd3eb7e0a8
- https://security.gentoo.org/glsa/202305-30
- https://security.gentoo.org/glsa/202305-30
- DSA-5304
- DSA-5304
Modified: 2024-11-21
CVE-2022-46340
A vulnerability was found in X.Org. This security flaw occurs becuase the swap handler for the XTestFakeInput request of the XTest extension may corrupt the stack if GenericEvents with lengths larger than 32 bytes are sent through a the XTestFakeInput request. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where client and server use the same byte order.
- https://access.redhat.com/security/cve/CVE-2022-46340
- https://access.redhat.com/security/cve/CVE-2022-46340
- https://bugzilla.redhat.com/show_bug.cgi?id=2151755
- https://bugzilla.redhat.com/show_bug.cgi?id=2151755
- FEDORA-2022-721a78b7e5
- FEDORA-2022-721a78b7e5
- FEDORA-2022-c3a65f7c65
- FEDORA-2022-c3a65f7c65
- FEDORA-2022-3d88188071
- FEDORA-2022-3d88188071
- FEDORA-2022-dd3eb7e0a8
- FEDORA-2022-dd3eb7e0a8
- https://security.gentoo.org/glsa/202305-30
- https://security.gentoo.org/glsa/202305-30
- DSA-5304
- DSA-5304
Modified: 2024-11-21
CVE-2022-46341
A vulnerability was found in X.Org. This security flaw occurs because the handler for the XIPassiveUngrab request accesses out-of-bounds memory when invoked with a high keycode or button code. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.
- https://access.redhat.com/security/cve/CVE-2022-46341
- https://access.redhat.com/security/cve/CVE-2022-46341
- https://bugzilla.redhat.com/show_bug.cgi?id=2151756
- https://bugzilla.redhat.com/show_bug.cgi?id=2151756
- FEDORA-2022-721a78b7e5
- FEDORA-2022-721a78b7e5
- FEDORA-2022-c3a65f7c65
- FEDORA-2022-c3a65f7c65
- FEDORA-2022-dd3eb7e0a8
- FEDORA-2022-dd3eb7e0a8
- https://security.gentoo.org/glsa/202305-30
- https://security.gentoo.org/glsa/202305-30
- DSA-5304
- DSA-5304
Modified: 2024-11-21
CVE-2022-46342
A vulnerability was found in X.Org. This security flaw occurs because the handler for the XvdiSelectVideoNotify request may write to memory after it has been freed. This issue can lead to local privileges elevation on systems where the X se
- https://access.redhat.com/security/cve/CVE-2022-46342
- https://access.redhat.com/security/cve/CVE-2022-46342
- https://bugzilla.redhat.com/show_bug.cgi?id=2151757
- https://bugzilla.redhat.com/show_bug.cgi?id=2151757
- FEDORA-2022-721a78b7e5
- FEDORA-2022-721a78b7e5
- FEDORA-2022-c3a65f7c65
- FEDORA-2022-c3a65f7c65
- FEDORA-2022-dd3eb7e0a8
- FEDORA-2022-dd3eb7e0a8
- https://security.gentoo.org/glsa/202305-30
- https://security.gentoo.org/glsa/202305-30
- DSA-5304
- DSA-5304
Modified: 2024-11-21
CVE-2022-46343
A vulnerability was found in X.Org. This security flaw occurs because the handler for the ScreenSaverSetAttributes request may write to memory after it has been freed. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.
- https://access.redhat.com/security/cve/CVE-2022-46343
- https://access.redhat.com/security/cve/CVE-2022-46343
- https://bugzilla.redhat.com/show_bug.cgi?id=2151758
- https://bugzilla.redhat.com/show_bug.cgi?id=2151758
- FEDORA-2022-721a78b7e5
- FEDORA-2022-721a78b7e5
- FEDORA-2022-c3a65f7c65
- FEDORA-2022-c3a65f7c65
- FEDORA-2022-dd3eb7e0a8
- FEDORA-2022-dd3eb7e0a8
- https://security.gentoo.org/glsa/202305-30
- https://security.gentoo.org/glsa/202305-30
- DSA-5304
- DSA-5304
Modified: 2024-11-21
CVE-2022-46344
A vulnerability was found in X.Org. This security flaw occurs because the handler for the XIChangeProperty request has a length-validation issues, resulting in out-of-bounds memory reads and potential information disclosure. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.
- http://www.openwall.com/lists/oss-security/2023/12/13/1
- http://www.openwall.com/lists/oss-security/2023/12/13/1
- https://access.redhat.com/security/cve/CVE-2022-46344
- https://access.redhat.com/security/cve/CVE-2022-46344
- https://bugzilla.redhat.com/show_bug.cgi?id=2151760
- https://bugzilla.redhat.com/show_bug.cgi?id=2151760
- FEDORA-2022-721a78b7e5
- FEDORA-2022-721a78b7e5
- FEDORA-2022-c3a65f7c65
- FEDORA-2022-c3a65f7c65
- FEDORA-2022-dd3eb7e0a8
- FEDORA-2022-dd3eb7e0a8
- https://security.gentoo.org/glsa/202305-30
- https://security.gentoo.org/glsa/202305-30
- DSA-5304
- DSA-5304
Modified: 2025-02-24
CVE-2023-0494
A vulnerability was found in X.Org. This issue occurs due to a dangling pointer in DeepCopyPointerClasses that can be exploited by ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() to read and write into freed memory. This can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.
- https://bugzilla.redhat.com/show_bug.cgi?id=2165995
- https://bugzilla.redhat.com/show_bug.cgi?id=2165995
- https://gitlab.freedesktop.org/xorg/xserver/-/commit/0ba6d8c37071131a49790243cdac55392ecf71ec
- https://gitlab.freedesktop.org/xorg/xserver/-/commit/0ba6d8c37071131a49790243cdac55392ecf71ec
- https://lists.x.org/archives/xorg-announce/2023-February/003320.html
- https://lists.x.org/archives/xorg-announce/2023-February/003320.html
- GLSA-202305-30
- GLSA-202305-30
Modified: 2025-02-14
CVE-2023-1393
A flaw was found in X.Org Server Overlay Window. A Use-After-Free may lead to local privilege escalation. If a client explicitly destroys the compositor overlay window (aka COW), the Xserver would leave a dangling pointer to that window in the CompScreen structure, which will trigger a use-after-free later.
- https://gitlab.freedesktop.org/xorg/xserver/-/commit/26ef545b3502f61ca722a7a3373507e88ef64110
- https://gitlab.freedesktop.org/xorg/xserver/-/commit/26ef545b3502f61ca722a7a3373507e88ef64110
- FEDORA-2023-b7835960ac
- FEDORA-2023-b7835960ac
- FEDORA-2023-eb3c27ff25
- FEDORA-2023-eb3c27ff25
- FEDORA-2023-66d5af0278
- FEDORA-2023-66d5af0278
- FEDORA-2023-fe18ae3e85
- FEDORA-2023-fe18ae3e85
- FEDORA-2023-239bae4b57
- FEDORA-2023-239bae4b57
- FEDORA-2023-f754e7abfd
- FEDORA-2023-f754e7abfd
- FEDORA-2023-b87fd3a628
- FEDORA-2023-b87fd3a628
- FEDORA-2023-6f3f9ee721
- FEDORA-2023-6f3f9ee721
- GLSA-202305-30
- GLSA-202305-30
- https://www.openwall.com/lists/oss-security/2023/03/29/1
- https://www.openwall.com/lists/oss-security/2023/03/29/1
Modified: 2024-11-21
CVE-2023-5367
A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.
- RHSA-2023:6802
- RHSA-2023:6802
- RHSA-2023:6808
- RHSA-2023:6808
- RHSA-2023:7373
- RHSA-2023:7373
- RHSA-2023:7388
- RHSA-2023:7388
- RHSA-2023:7405
- RHSA-2023:7405
- RHSA-2023:7428
- RHSA-2023:7428
- RHSA-2023:7436
- RHSA-2023:7436
- RHSA-2023:7526
- RHSA-2023:7526
- RHSA-2023:7533
- RHSA-2023:7533
- RHSA-2024:0010
- RHSA-2024:0010
- RHSA-2024:0128
- RHSA-2024:0128
- RHSA-2024:2169
- RHSA-2024:2169
- RHSA-2024:2170
- RHSA-2024:2170
- RHSA-2024:2995
- RHSA-2024:2995
- RHSA-2024:2996
- RHSA-2024:2996
- https://access.redhat.com/security/cve/CVE-2023-5367
- https://access.redhat.com/security/cve/CVE-2023-5367
- RHBZ#2243091
- RHBZ#2243091
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2WS5E7H4A5J3U5YBCTMRPQVGWK5LVH7D/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3RK66CXMXO3PCPDU3GDY5FK4UYHUXQJT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4YBK3I6SETHETBHDETFWM3VSZUQICIDV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AKKIE626TZOOPD533EYN47J4RFNHZVOP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO2Q2NP6R62ZRQQG3XQ4AXUT7J2EKKKY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L2RMNR4235YXZZQ2X7Q4MTOZDMZ7BBQU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SEDJN4VFN57K5POOC7BNVD6L6WUUCSG6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SN6KV4XGQJRVAOSM5C3CWMVAXO53COIP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TJXNI4BXURC2BKPNAHFJK3C5ZETB7PER/
- https://lists.x.org/archives/xorg-announce/2023-October/003430.html
- https://lists.x.org/archives/xorg-announce/2023-October/003430.html
- https://security.gentoo.org/glsa/202401-30
- https://security.netapp.com/advisory/ntap-20231130-0004/
- https://www.debian.org/security/2023/dsa-5534
Modified: 2024-11-21
CVE-2023-5380
A use-after-free flaw was found in the xorg-x11-server. An X server crash may occur in a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode) if the pointer is warped from within a window on one screen to the root window of the other screen and if the original window is destroyed followed by another window being destroyed.
- RHSA-2023:7428
- RHSA-2023:7428
- RHSA-2024:2169
- RHSA-2024:2169
- RHSA-2024:2298
- RHSA-2024:2298
- RHSA-2024:2995
- RHSA-2024:2995
- RHSA-2024:3067
- RHSA-2024:3067
- https://access.redhat.com/security/cve/CVE-2023-5380
- https://access.redhat.com/security/cve/CVE-2023-5380
- RHBZ#2244736
- RHBZ#2244736
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2WS5E7H4A5J3U5YBCTMRPQVGWK5LVH7D/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3RK66CXMXO3PCPDU3GDY5FK4UYHUXQJT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AKKIE626TZOOPD533EYN47J4RFNHZVOP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO2Q2NP6R62ZRQQG3XQ4AXUT7J2EKKKY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SN6KV4XGQJRVAOSM5C3CWMVAXO53COIP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TJXNI4BXURC2BKPNAHFJK3C5ZETB7PER/
- https://lists.x.org/archives/xorg-announce/2023-October/003430.html
- https://lists.x.org/archives/xorg-announce/2023-October/003430.html
- https://security.gentoo.org/glsa/202401-30
- https://security.netapp.com/advisory/ntap-20231130-0004/
- https://www.debian.org/security/2023/dsa-5534
Modified: 2024-11-21
CVE-2023-6377
A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote code execution in cases where X11 forwarding is involved.
- http://www.openwall.com/lists/oss-security/2023/12/13/1
- RHSA-2023:7886
- RHSA-2023:7886
- RHSA-2024:0006
- RHSA-2024:0006
- RHSA-2024:0009
- RHSA-2024:0009
- RHSA-2024:0010
- RHSA-2024:0010
- RHSA-2024:0014
- RHSA-2024:0014
- RHSA-2024:0015
- RHSA-2024:0015
- RHSA-2024:0016
- RHSA-2024:0016
- RHSA-2024:0017
- RHSA-2024:0017
- RHSA-2024:0018
- RHSA-2024:0018
- RHSA-2024:0020
- RHSA-2024:0020
- RHSA-2024:2169
- RHSA-2024:2169
- RHSA-2024:2170
- RHSA-2024:2170
- RHSA-2024:2995
- RHSA-2024:2995
- RHSA-2024:2996
- RHSA-2024:2996
- https://access.redhat.com/security/cve/CVE-2023-6377
- https://access.redhat.com/security/cve/CVE-2023-6377
- RHBZ#2253291
- RHBZ#2253291
- https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd
- https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd
- https://lists.debian.org/debian-lts-announce/2023/12/msg00008.html
- https://lists.debian.org/debian-lts-announce/2023/12/msg00013.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6R63Z6GIWM3YUNZRCGFODUXLW3GY2HD6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7PP47YXKM5ETLCYEF6473R3VFCJ6QT2S/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFHV5KCQ2SVOD4QMCPZ5HC6YL44L7YJD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LJDFWDB7EQVZA45XDP7L5WRSRWS6RVRR/
- https://lists.x.org/archives/xorg-announce/2023-December/003435.html
- https://lists.x.org/archives/xorg-announce/2023-December/003435.html
- https://security.gentoo.org/glsa/202401-30
- https://security.netapp.com/advisory/ntap-20240125-0003/
- https://www.debian.org/security/2023/dsa-5576
Modified: 2024-11-21
CVE-2023-6478
A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.
- http://www.openwall.com/lists/oss-security/2023/12/13/1
- RHSA-2023:7886
- RHSA-2023:7886
- RHSA-2024:0006
- RHSA-2024:0006
- RHSA-2024:0009
- RHSA-2024:0009
- RHSA-2024:0010
- RHSA-2024:0010
- RHSA-2024:0014
- RHSA-2024:0014
- RHSA-2024:0015
- RHSA-2024:0015
- RHSA-2024:0016
- RHSA-2024:0016
- RHSA-2024:0017
- RHSA-2024:0017
- RHSA-2024:0018
- RHSA-2024:0018
- RHSA-2024:0020
- RHSA-2024:0020
- RHSA-2024:2169
- RHSA-2024:2169
- RHSA-2024:2170
- RHSA-2024:2170
- RHSA-2024:2995
- RHSA-2024:2995
- RHSA-2024:2996
- RHSA-2024:2996
- https://access.redhat.com/security/cve/CVE-2023-6478
- https://access.redhat.com/security/cve/CVE-2023-6478
- RHBZ#2253298
- RHBZ#2253298
- https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632
- https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632
- https://lists.debian.org/debian-lts-announce/2023/12/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6R63Z6GIWM3YUNZRCGFODUXLW3GY2HD6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7PP47YXKM5ETLCYEF6473R3VFCJ6QT2S/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFHV5KCQ2SVOD4QMCPZ5HC6YL44L7YJD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LJDFWDB7EQVZA45XDP7L5WRSRWS6RVRR/
- https://lists.x.org/archives/xorg-announce/2023-December/003435.html
- https://lists.x.org/archives/xorg-announce/2023-December/003435.html
- https://security.gentoo.org/glsa/202401-30
- https://security.netapp.com/advisory/ntap-20240125-0003/
- https://www.debian.org/security/2023/dsa-5576
Modified: 2024-11-21
CVE-2023-6816
A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number of buttons, leading to a heap overflow if a bigger value was used.
- http://www.openwall.com/lists/oss-security/2024/01/18/1
- RHSA-2024:0320
- RHSA-2024:0320
- RHSA-2024:0557
- RHSA-2024:0557
- RHSA-2024:0558
- RHSA-2024:0558
- RHSA-2024:0597
- RHSA-2024:0597
- RHSA-2024:0607
- RHSA-2024:0607
- RHSA-2024:0614
- RHSA-2024:0614
- RHSA-2024:0617
- RHSA-2024:0617
- RHSA-2024:0621
- RHSA-2024:0621
- RHSA-2024:0626
- RHSA-2024:0626
- RHSA-2024:0629
- RHSA-2024:0629
- RHSA-2024:2169
- RHSA-2024:2169
- RHSA-2024:2170
- RHSA-2024:2170
- RHSA-2024:2996
- RHSA-2024:2996
- https://access.redhat.com/security/cve/CVE-2023-6816
- https://access.redhat.com/security/cve/CVE-2023-6816
- RHBZ#2257691
- RHBZ#2257691
- https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/
- https://security.gentoo.org/glsa/202401-30
- https://security.netapp.com/advisory/ntap-20240307-0006/
Modified: 2024-11-23
CVE-2024-0229
An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.
- RHSA-2024:0320
- RHSA-2024:0557
- RHSA-2024:0558
- RHSA-2024:0597
- RHSA-2024:0607
- RHSA-2024:0614
- RHSA-2024:0617
- RHSA-2024:0621
- RHSA-2024:0626
- RHSA-2024:0629
- RHSA-2024:2169
- RHSA-2024:2170
- RHSA-2024:2995
- RHSA-2024:2996
- https://access.redhat.com/security/cve/CVE-2024-0229
- RHBZ#2256690
- RHSA-2024:0320
- RHBZ#2256690
- https://access.redhat.com/security/cve/CVE-2024-0229
- RHSA-2024:2996
- RHSA-2024:2995
- RHSA-2024:2170
- RHSA-2024:2169
- RHSA-2024:0629
- RHSA-2024:0626
- RHSA-2024:0621
- RHSA-2024:0617
- RHSA-2024:0614
- RHSA-2024:0607
- RHSA-2024:0597
- RHSA-2024:0558
- RHSA-2024:0557
Modified: 2024-11-21
CVE-2024-0408
A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.
- RHSA-2024:0320
- RHSA-2024:0320
- RHSA-2024:2169
- RHSA-2024:2169
- RHSA-2024:2170
- RHSA-2024:2170
- RHSA-2024:2995
- RHSA-2024:2995
- RHSA-2024:2996
- RHSA-2024:2996
- https://access.redhat.com/security/cve/CVE-2024-0408
- https://access.redhat.com/security/cve/CVE-2024-0408
- RHBZ#2257689
- RHBZ#2257689
- https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/
- https://security.gentoo.org/glsa/202401-30
- https://security.netapp.com/advisory/ntap-20240307-0006/
Modified: 2024-11-21
CVE-2024-0409
A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.
- RHSA-2024:0320
- RHSA-2024:0320
- RHSA-2024:2169
- RHSA-2024:2169
- RHSA-2024:2170
- RHSA-2024:2170
- RHSA-2024:2995
- RHSA-2024:2995
- RHSA-2024:2996
- RHSA-2024:2996
- https://access.redhat.com/security/cve/CVE-2024-0409
- https://access.redhat.com/security/cve/CVE-2024-0409
- RHBZ#2257690
- RHBZ#2257690
- https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/
- https://security.gentoo.org/glsa/202401-30
- https://security.netapp.com/advisory/ntap-20240307-0006/
Modified: 2024-11-21
CVE-2024-21885
A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.
- RHSA-2024:0320
- RHSA-2024:0320
- RHSA-2024:0557
- RHSA-2024:0557
- RHSA-2024:0558
- RHSA-2024:0558
- RHSA-2024:0597
- RHSA-2024:0597
- RHSA-2024:0607
- RHSA-2024:0607
- RHSA-2024:0614
- RHSA-2024:0614
- RHSA-2024:0617
- RHSA-2024:0617
- RHSA-2024:0621
- RHSA-2024:0621
- RHSA-2024:0626
- RHSA-2024:0626
- RHSA-2024:0629
- RHSA-2024:0629
- RHSA-2024:2169
- RHSA-2024:2169
- RHSA-2024:2170
- RHSA-2024:2170
- RHSA-2024:2995
- RHSA-2024:2995
- RHSA-2024:2996
- RHSA-2024:2996
- https://access.redhat.com/security/cve/CVE-2024-21885
- https://access.redhat.com/security/cve/CVE-2024-21885
- RHBZ#2256540
- RHBZ#2256540
- https://security.netapp.com/advisory/ntap-20240503-0004/
Modified: 2024-11-21
CVE-2024-21886
A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.
- RHSA-2024:0320
- RHSA-2024:0320
- RHSA-2024:0557
- RHSA-2024:0557
- RHSA-2024:0558
- RHSA-2024:0558
- RHSA-2024:0597
- RHSA-2024:0597
- RHSA-2024:0607
- RHSA-2024:0607
- RHSA-2024:0614
- RHSA-2024:0614
- RHSA-2024:0617
- RHSA-2024:0617
- RHSA-2024:0621
- RHSA-2024:0621
- RHSA-2024:0626
- RHSA-2024:0626
- RHSA-2024:0629
- RHSA-2024:0629
- RHSA-2024:2169
- RHSA-2024:2169
- RHSA-2024:2170
- RHSA-2024:2170
- RHSA-2024:2995
- RHSA-2024:2995
- RHSA-2024:2996
- RHSA-2024:2996
- https://access.redhat.com/security/cve/CVE-2024-21886
- https://access.redhat.com/security/cve/CVE-2024-21886
- RHBZ#2256542
- RHBZ#2256542