A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 08:41
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://access.redhat.com/errata/RHSA-2023:6802 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2023:6808 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2023:7373 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2023:7388 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2023:7405 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2023:7428 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2023:7436 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2023:7526 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2023:7533 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:0010 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:0128 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:2169 - | |
References | () https://access.redhat.com/errata/RHSA-2024:2170 - | |
References | () https://access.redhat.com/errata/RHSA-2024:2995 - | |
References | () https://access.redhat.com/errata/RHSA-2024:2996 - | |
References | () https://access.redhat.com/security/cve/CVE-2023-5367 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2243091 - Issue Tracking, Third Party Advisory | |
References | () https://lists.x.org/archives/xorg-announce/2023-October/003430.html - Patch, Vendor Advisory |
16 Sep 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 May 2024, 17:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Apr 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Feb 2024, 15:33
Type | Values Removed | Values Added |
---|---|---|
First Time |
Redhat enterprise Linux For Ibm Z Systems
Redhat enterprise Linux Workstation Redhat enterprise Linux For Power Big Endian Redhat enterprise Linux Desktop Redhat enterprise Linux For Scientific Computing Redhat enterprise Linux For Power Little Endian Redhat enterprise Linux Server |
|
References | () https://access.redhat.com/errata/RHSA-2023:6802 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2023:6808 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2023:7373 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2023:7388 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2023:7405 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2023:7428 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2023:7436 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2023:7526 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2023:7533 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:0010 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:0128 - Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2WS5E7H4A5J3U5YBCTMRPQVGWK5LVH7D/ - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3RK66CXMXO3PCPDU3GDY5FK4UYHUXQJT/ - Mailing List | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4YBK3I6SETHETBHDETFWM3VSZUQICIDV/ - Mailing List | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AKKIE626TZOOPD533EYN47J4RFNHZVOP/ - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO2Q2NP6R62ZRQQG3XQ4AXUT7J2EKKKY/ - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L2RMNR4235YXZZQ2X7Q4MTOZDMZ7BBQU/ - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TJXNI4BXURC2BKPNAHFJK3C5ZETB7PER/ - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/202401-30 - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20231130-0004/ - Third Party Advisory | |
CPE | cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* |
31 Jan 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
02 Jan 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Nov 2023, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
28 Nov 2023, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Nov 2023, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-25 20:15
Updated : 2024-11-21 08:41
NVD link : CVE-2023-5367
Mitre link : CVE-2023-5367
CVE.ORG link : CVE-2023-5367
JSON object : View
Products Affected
fedoraproject
- fedora
redhat
- enterprise_linux_for_ibm_z_systems
- enterprise_linux_workstation
- enterprise_linux_for_power_big_endian
- enterprise_linux_for_scientific_computing
- enterprise_linux_server
- enterprise_linux_for_power_little_endian
- enterprise_linux
- enterprise_linux_desktop
debian
- debian_linux
x.org
- xwayland
- x_server
CWE
CWE-787
Out-of-bounds Write