Advisory Published

USN-6587-1: X.Org X Server vulnerabilities

First published: Tue Jan 16 2024(Updated: )

Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled memory when processing the DeviceFocusEvent and ProcXIQueryPointer APIs. An attacker could possibly use this issue to cause the X Server to crash, obtain sensitive information, or execute arbitrary code. (CVE-2023-6816) Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled reattaching to a different master device. An attacker could use this issue to cause the X Server to crash, leading to a denial of service, or possibly execute arbitrary code. (CVE-2024-0229) Olivier Fourdan and Donn Seeley discovered that the X.Org X Server incorrectly labeled GLX PBuffers when used with SELinux. An attacker could use this issue to cause the X Server to crash, leading to a denial of service. (CVE-2024-0408) Olivier Fourdan discovered that the X.Org X Server incorrectly handled the curser code when used with SELinux. An attacker could use this issue to cause the X Server to crash, leading to a denial of service. (CVE-2024-0409) Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled memory when processing the XISendDeviceHierarchyEvent API. An attacker could possibly use this issue to cause the X Server to crash, or execute arbitrary code. (CVE-2024-21885) Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled devices being disabled. An attacker could possibly use this issue to cause the X Server to crash, or execute arbitrary code. (CVE-2024-21886)

Affected SoftwareAffected VersionHow to fix
All of
ubuntu/xserver-xorg-core<2:21.1.7-3ubuntu2.6
2:21.1.7-3ubuntu2.6
Ubuntu=23.10
All of
ubuntu/xwayland<2:23.2.0-1ubuntu0.4
2:23.2.0-1ubuntu0.4
Ubuntu=23.10
All of
ubuntu/xserver-xorg-core<2:21.1.7-1ubuntu3.6
2:21.1.7-1ubuntu3.6
Ubuntu=23.04
All of
ubuntu/xwayland<2:22.1.8-1ubuntu1.4
2:22.1.8-1ubuntu1.4
Ubuntu=23.04
All of
ubuntu/xserver-xorg-core<2:21.1.4-2ubuntu1.7~22.04.7
2:21.1.4-2ubuntu1.7~22.04.7
Ubuntu=22.04
All of
ubuntu/xwayland<2:22.1.1-1ubuntu0.10
2:22.1.1-1ubuntu0.10
Ubuntu=22.04
All of
ubuntu/xserver-xorg-core<2:1.20.13-1ubuntu1~20.04.14
2:1.20.13-1ubuntu1~20.04.14
Ubuntu=20.04
All of
ubuntu/xwayland<2:1.20.13-1ubuntu1~20.04.14
2:1.20.13-1ubuntu1~20.04.14
Ubuntu=20.04

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Child vulnerabilities

(Contains the following vulnerabilities)

Frequently Asked Questions

  • What is the severity of USN-6587-1?

    USN-6587-1 is classified as a high-severity vulnerability that could lead to a crash of the X Server or execution of arbitrary code.

  • How do I fix USN-6587-1?

    To fix USN-6587-1, upgrade to the latest package versions indicated in the advisory for your Ubuntu release.

  • What are the affected products in USN-6587-1?

    The affected products include the xserver-xorg-core and xwayland packages on various versions of Ubuntu, such as 20.04, 22.04, and 23.04.

  • Can USN-6587-1 lead to data loss?

    Yes, USN-6587-1 may potentially allow an attacker to obtain sensitive information, leading to data exposure.

  • What specific APIs are impacted by USN-6587-1?

    USN-6587-1 affects the DeviceFocusEvent and ProcXIQueryPointer APIs in the X.Org X Server.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203