First published: Tue Oct 10 2023(Updated: )
A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xorg-server | <=2:1.20.4-1+deb10u4<=2:1.20.11-1+deb11u6 | 2:1.20.4-1+deb10u12 2:1.20.11-1+deb11u10 2:21.1.7-3+deb12u2 2:21.1.7-3+deb12u4 2:21.1.10-1 |
debian/xwayland | <=2:22.1.9-1 | 2:23.2.3-1 |
ubuntu/xorg-server | <2:1.15.1-0ubuntu2.11+ | 2:1.15.1-0ubuntu2.11+ |
ubuntu/xorg-server | <2:1.18.4-0ubuntu0.12+ | 2:1.18.4-0ubuntu0.12+ |
ubuntu/xorg-server | <2:1.19.6-1ubuntu4.15+ | 2:1.19.6-1ubuntu4.15+ |
ubuntu/xorg-server | <21.1.9 | 21.1.9 |
ubuntu/xorg-server | <2:1.20.13-1ubuntu1~20.04.9 | 2:1.20.13-1ubuntu1~20.04.9 |
ubuntu/xorg-server | <2:21.1.4-2ubuntu1.7~22.04.2 | 2:21.1.4-2ubuntu1.7~22.04.2 |
ubuntu/xorg-server | <2:21.1.7-1ubuntu3.1 | 2:21.1.7-1ubuntu3.1 |
ubuntu/xorg-server | <2:21.1.7-3ubuntu2.1 | 2:21.1.7-3ubuntu2.1 |
ubuntu/xwayland | <23.2.2 | 23.2.2 |
ubuntu/xwayland | <2:22.1.1-1ubuntu0.7 | 2:22.1.1-1ubuntu0.7 |
ubuntu/xwayland | <2:22.1.8-1ubuntu1.1 | 2:22.1.8-1ubuntu1.1 |
ubuntu/xwayland | <2:23.2.0-1ubuntu0.1 | 2:23.2.0-1ubuntu0.1 |
X.Org X Server | <21.1.9 | |
X.org Xwayland | <23.2.2 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
Fedoraproject Fedora | =38 | |
Debian Debian Linux | =11.0 | |
Debian Debian Linux | =12.0 | |
redhat/xorg-server | <21.1.9 | 21.1.9 |
redhat/xwayland | <23.2.2 | 23.2.2 |
IBM Security Guardium | <=11.3 | |
IBM Security Guardium | <=11.4 | |
IBM Security Guardium | <=11.5 | |
IBM Security Guardium | <=12.0 | |
<21.1.9 | ||
<23.2.2 | ||
=7.0 | ||
=8.0 | ||
=9.0 | ||
=7.0 | ||
=7.0_s390x | ||
=7.0_ppc64 | ||
=7.0_ppc64le | ||
=7.0 | ||
=7.0 | ||
=7.0 | ||
=37 | ||
=38 | ||
=39 | ||
=11.0 | ||
=12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-5367 is high (7.8).
CVE-2023-5367 affects xorg-x11-server versions 2:1.15.1-0ubuntu2.11+ or later.
CVE-2023-5367 affects xwayland versions 2:23.2.2 or earlier.
The remedy for CVE-2023-5367 on Ubuntu is to update xorg-server to version 2:1.15.1-0ubuntu2.11+ or later.
The remedy for CVE-2023-5367 on Debian is to update xorg-server to version 2:1.20.4-1+deb10u10, 2:1.20.11-1+deb11u8, or 2:21.1.7-3+deb12u2.