A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
AND |
|
History
21 Nov 2024, 08:43
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://access.redhat.com/errata/RHSA-2023:7886 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:0006 - | |
References | () https://access.redhat.com/errata/RHSA-2024:0009 - | |
References | () https://access.redhat.com/errata/RHSA-2024:0010 - | |
References | () https://access.redhat.com/errata/RHSA-2024:0014 - | |
References | () https://access.redhat.com/errata/RHSA-2024:0015 - | |
References | () https://access.redhat.com/errata/RHSA-2024:0016 - | |
References | () https://access.redhat.com/errata/RHSA-2024:0017 - | |
References | () https://access.redhat.com/errata/RHSA-2024:0018 - | |
References | () https://access.redhat.com/errata/RHSA-2024:0020 - | |
References | () https://access.redhat.com/errata/RHSA-2024:2169 - | |
References | () https://access.redhat.com/errata/RHSA-2024:2170 - | |
References | () https://access.redhat.com/errata/RHSA-2024:2995 - | |
References | () https://access.redhat.com/errata/RHSA-2024:2996 - | |
References | () https://access.redhat.com/security/cve/CVE-2023-6478 - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2253298 - Issue Tracking | |
References | () https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632 - Patch | |
References | () https://lists.x.org/archives/xorg-announce/2023-December/003435.html - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.6 |
16 Sep 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 May 2024, 17:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Apr 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
31 Jan 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jan 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
02 Jan 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Dec 2023, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Dec 2023, 17:21
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-190 | |
References |
|
|
References | () https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632 - Patch | |
References | () https://access.redhat.com/security/cve/CVE-2023-6478 - Vendor Advisory | |
References | () https://lists.x.org/archives/xorg-announce/2023-December/003435.html - Vendor Advisory | |
References | () https://www.debian.org/security/2023/dsa-5576 - Vendor Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LJDFWDB7EQVZA45XDP7L5WRSRWS6RVRR/ - Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2023/12/msg00008.html - Mailing List | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2253298 - Issue Tracking | |
References | () http://www.openwall.com/lists/oss-security/2023/12/13/1 - Mailing List | |
CPE | cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:* cpe:2.3:a:tigervnc:tigervnc:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:* cpe:2.3:a:x.org:xwayland:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
15 Dec 2023, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
13 Dec 2023, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
13 Dec 2023, 13:35
Type | Values Removed | Values Added |
---|---|---|
References |
|
13 Dec 2023, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-13 07:15
Updated : 2024-11-21 08:43
NVD link : CVE-2023-6478
Mitre link : CVE-2023-6478
CVE.ORG link : CVE-2023-6478
JSON object : View
Products Affected
redhat
- enterprise_linux_eus
- enterprise_linux
debian
- debian_linux
x.org
- xwayland
- x_server
tigervnc
- tigervnc
CWE
CWE-190
Integer Overflow or Wraparound