A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
AND |
|
History
30 Apr 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
31 Jan 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jan 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
11 Jan 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
02 Jan 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
29 Dec 2023, 05:15
Type | Values Removed | Values Added |
---|---|---|
CWE |
25 Dec 2023, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
21 Dec 2023, 17:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2023/12/13/1 - Mailing List | |
References | () https://access.redhat.com/errata/RHSA-2023:7886 - Vendor Advisory | |
References | () https://access.redhat.com/security/cve/CVE-2023-6478 - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2253298 - Issue Tracking | |
References | () https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632 - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2023/12/msg00008.html - Mailing List | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7PP47YXKM5ETLCYEF6473R3VFCJ6QT2S/ - Vendor Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LJDFWDB7EQVZA45XDP7L5WRSRWS6RVRR/ - Vendor Advisory | |
References | () https://lists.x.org/archives/xorg-announce/2023-December/003435.html - Vendor Advisory | |
References | () https://www.debian.org/security/2023/dsa-5576 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:a:tigervnc:tigervnc:-:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:* cpe:2.3:a:x.org:xwayland:*:*:*:*:*:*:*:* |
|
CWE | CWE-190 | |
First Time |
Redhat enterprise Linux
X.org Debian Redhat enterprise Linux Eus Redhat Tigervnc Tigervnc tigervnc X.org xwayland Debian debian Linux X.org x Server |
20 Dec 2023, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
19 Dec 2023, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
15 Dec 2023, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
13 Dec 2023, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
13 Dec 2023, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary |
|
13 Dec 2023, 10:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
13 Dec 2023, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-13 07:15
Updated : 2024-04-30 14:15
NVD link : CVE-2023-6478
Mitre link : CVE-2023-6478
CVE.ORG link : CVE-2023-6478
JSON object : View
Products Affected
x.org
- x_server
- xwayland
debian
- debian_linux
redhat
- enterprise_linux
- enterprise_linux_eus
tigervnc
- tigervnc
CWE
CWE-190
Integer Overflow or Wraparound