Bug 2257691 (CVE-2023-6816)
Summary: | CVE-2023-6816 xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Patrick Del Bello <pdelbell> |
Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
Status: | NEW --- | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | security-response-team |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | xorg-server-21.1.11, xwayland-23.2.4 | Doc Type: | --- |
Doc Text: |
A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number of buttons, leading to a heap overflow if a bigger value was used.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2258926, 2258927 | ||
Bug Blocks: | 2256538 |
Description
Patrick Del Bello
2024-01-10 14:02:10 UTC
Created tigervnc tracking bugs for this issue: Affects: fedora-all [bug 2258927] Created xorg-x11-server tracking bugs for this issue: Affects: fedora-all [bug 2258926] This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2024:0320 https://access.redhat.com/errata/RHSA-2024:0320 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:0557 https://access.redhat.com/errata/RHSA-2024:0557 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Red Hat Enterprise Linux 8.4 Telecommunications Update Service Via RHSA-2024:0558 https://access.redhat.com/errata/RHSA-2024:0558 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2024:0597 https://access.redhat.com/errata/RHSA-2024:0597 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:0607 https://access.redhat.com/errata/RHSA-2024:0607 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2024:0614 https://access.redhat.com/errata/RHSA-2024:0614 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2024:0621 https://access.redhat.com/errata/RHSA-2024:0621 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions Red Hat Enterprise Linux 8.2 Telecommunications Update Service Via RHSA-2024:0617 https://access.redhat.com/errata/RHSA-2024:0617 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:0626 https://access.redhat.com/errata/RHSA-2024:0626 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2024:0629 https://access.redhat.com/errata/RHSA-2024:0629 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:2170 https://access.redhat.com/errata/RHSA-2024:2170 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:2169 https://access.redhat.com/errata/RHSA-2024:2169 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:2996 https://access.redhat.com/errata/RHSA-2024:2996 |