[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256288

 
 

909

 
 

199146

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2024:2995 -- Redhat xorg-x11-server

ID: oval:org.secpod.oval:def:509332Date: (C)2024-05-24   (M)2024-06-18
Class: PATCHFamily: unix




X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Security Fix: xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access xorg-x11-server: SELinux unlabeled GLX PBuffer xorg-x11-server: SELinux context corruption xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent xorg-x11-server: heap buffer overflow in DisableDevice xorg-x11-server: Use-after-free bug in DestroyWindow For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.10 Release Notes linked from the References section.

Platform:
Red Hat Enterprise Linux 8
Product:
xorg-x11-server
Reference:
RHSA-2024:2995
CVE-2023-5367
CVE-2023-6377
CVE-2023-6478
CVE-2024-0229
CVE-2024-0408
CVE-2024-0409
CVE-2024-21885
CVE-2024-21886
CVE-2023-5380
CVE    9
CVE-2023-5380
CVE-2023-5367
CVE-2023-6377
CVE-2023-6478
...

© SecPod Technologies