First published: Wed Jan 10 2024(Updated: )
A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/xorg-server | <21.1.11 | 21.1.11 |
redhat/xwayland | <23.2.4 | 23.2.4 |
debian/xorg-server | 2:1.20.11-1+deb11u13 2:1.20.11-1+deb11u15 2:21.1.7-3+deb12u9 2:21.1.16-1 | |
debian/xwayland | <=2:22.1.9-1 | 2:24.1.6-1 |
Tigervnc | <1.13.1 | |
X.Org Xserver | <21.1.11 | |
Red Hat Xorg-x11-server-xwayland | <23.2.4 | |
Red Hat Fedora | =39 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux for IBM Z Systems | =7.0 | |
Red Hat Enterprise Linux for Power, big endian | =7.0 | |
Red Hat Enterprise Linux for Power, little endian | =7.0 | |
Red Hat Enterprise Linux for Scientific Computing | =7.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0409 has been classified with a moderate severity level due to the potential impact on system security.
To remediate CVE-2024-0409, update the xorg-server to version 21.1.11 or later and xwayland to version 23.2.4 or later.
CVE-2024-0409 affects versions of xorg-server prior to 21.1.11 and xwayland prior to 23.2.4, as well as specific versions of Red Hat and Debian systems.
CVE-2024-0409 involves a flaw in the cursor code of the X.Org server, which can overwrite the XSELINUX context.
CVE-2024-0409 may have implications for system integrity, particularly in environments utilizing SELinux configurations.