Lucene search

K
redhatRedHatRHSA-2024:2170
HistoryApr 30, 2024 - 6:14 a.m.

(RHSA-2024:2170) Moderate: xorg-x11-server-Xwayland security update

2024-04-3006:14:56
access.redhat.com
6
xwayland
out-of-bounds write
memory reads/writes
heap buffer overflow
selinux
red hat enterprise linux 9.4

7.5 High

AI Score

Confidence

High

0.273 Low

EPSS

Percentile

96.8%

Xwayland is an X server for running X clients under Wayland.

Security Fix(es):

  • xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)

  • xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)

  • xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)

  • xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)

  • xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)

  • xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)

  • xorg-x11-server: SELinux context corruption (CVE-2024-0409)

  • xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)

  • xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.4 Release Notes linked from the References section.