A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
AND |
|
History
16 Sep 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 May 2024, 17:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Apr 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
31 Jan 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jan 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
11 Jan 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
02 Jan 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Dec 2023, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Dec 2023, 17:21
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:x.org:xwayland:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:a:tigervnc:tigervnc:-:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
First Time |
X.org
X.org x Server X.org xwayland Redhat enterprise Linux Tigervnc Tigervnc tigervnc Redhat enterprise Linux Eus Redhat Debian debian Linux Debian |
|
CWE | CWE-190 | |
References |
|
|
References | () https://www.debian.org/security/2023/dsa-5576 - Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2023/12/13/1 - Mailing List | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2253298 - Issue Tracking | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LJDFWDB7EQVZA45XDP7L5WRSRWS6RVRR/ - Vendor Advisory | |
References | () https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632 - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2023/12/msg00008.html - Mailing List | |
References | () https://access.redhat.com/security/cve/CVE-2023-6478 - Vendor Advisory | |
References | () https://lists.x.org/archives/xorg-announce/2023-December/003435.html - Vendor Advisory |
15 Dec 2023, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-13 07:15
Updated : 2024-09-16 16:15
NVD link : CVE-2023-6478
Mitre link : CVE-2023-6478
CVE.ORG link : CVE-2023-6478
JSON object : View
Products Affected
x.org
- x_server
- xwayland
redhat
- enterprise_linux
- enterprise_linux_eus
debian
- debian_linux
tigervnc
- tigervnc
CWE
CWE-190
Integer Overflow or Wraparound