[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256288

 
 

909

 
 

199146

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2024:2996 -- Redhat xorg-x11-server-Xwayland

ID: oval:org.secpod.oval:def:509372Date: (C)2024-05-24   (M)2024-06-18
Class: PATCHFamily: unix




Xwayland is an X server for running X clients under Wayland. Security Fix: xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access xorg-x11-server: SELinux unlabeled GLX PBuffer xorg-x11-server: SELinux context corruption xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent xorg-x11-server: heap buffer overflow in DisableDevice For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.10 Release Notes linked from the References section.

Platform:
Red Hat Enterprise Linux 8
Product:
xorg-x11-server-Xwayland
Reference:
RHSA-2024:2996
CVE-2023-5367
CVE-2023-6377
CVE-2023-6478
CVE-2023-6816
CVE-2024-0229
CVE-2024-0408
CVE-2024-0409
CVE-2024-21885
CVE-2024-21886
CVE    9
CVE-2023-5367
CVE-2023-6377
CVE-2023-6478
CVE-2024-0409
...

© SecPod Technologies