Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 922395 (CVE-2023-6816, CVE-2024-0229, CVE-2024-0408, CVE-2024-0409, CVE-2024-21885, CVE-2024-21886) - <x11-base/xorg-server-21.1.11, <x11-base/xwayland-23.2.4: multiple vulnerabilities
Summary: <x11-base/xorg-server-21.1.11, <x11-base/xwayland-23.2.4: multiple vulnerabil...
Status: RESOLVED FIXED
Alias: CVE-2023-6816, CVE-2024-0229, CVE-2024-0408, CVE-2024-0409, CVE-2024-21885, CVE-2024-21886
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal critical (vote)
Assignee: Gentoo Security
URL: https://www.openwall.com/lists/oss-se...
Whiteboard: A1 [glsa+]
Keywords:
Depends on: 922453 922454
Blocks:
  Show dependency tree
 
Reported: 2024-01-18 15:42 UTC by Christopher Fore
Modified: 2024-01-31 11:36 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Christopher Fore 2024-01-18 15:42:36 UTC
CVE-2023-6816 (https://access.redhat.com/security/cve/CVE-2023-6816):

A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number of buttons, leading to a heap overflow if a bigger value was used.


CVE-2024-0229 (https://access.redhat.com/security/cve/cve-2024-0229):

An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device, which may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.


CVE-2024-0408 (https://access.redhat.com/security/cve/CVE-2024-0408):

SELinux unlabeled GLX PBuffer


CVE-2024-0409 (https://access.redhat.com/security/cve/CVE-2024-0409):

SELinux context corruption


CVE-2024-21885 (https://access.redhat.com/security/cve/CVE-2024-21885):

A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.


CVE-2024-21886 (https://access.redhat.com/security/cve/CVE-2024-21886):

A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.



I could not find any official releases from X11 or the XWayland teams regarding these
Comment 1 Larry the Git Cow gentoo-dev 2024-01-24 17:00:50 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=cc1106f96e16b0fe52503e4590924fc6359a167d

commit cc1106f96e16b0fe52503e4590924fc6359a167d
Author:     Matt Turner <mattst88@gentoo.org>
AuthorDate: 2024-01-24 16:51:50 +0000
Commit:     Matt Turner <mattst88@gentoo.org>
CommitDate: 2024-01-24 17:00:44 +0000

    x11-base/xwayland: Drop old versions
    
    Bug: https://bugs.gentoo.org/922395
    Signed-off-by: Matt Turner <mattst88@gentoo.org>

 x11-base/xwayland/Manifest                  |   1 -
 x11-base/xwayland/xwayland-23.2.3-r1.ebuild | 112 ----------------------------
 x11-base/xwayland/xwayland-23.2.3.ebuild    | 109 ---------------------------
 3 files changed, 222 deletions(-)
Comment 2 Larry the Git Cow gentoo-dev 2024-01-26 04:52:57 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=3ebedef790e0fce465c97b698e866f03aa635808

commit 3ebedef790e0fce465c97b698e866f03aa635808
Author:     Matt Turner <mattst88@gentoo.org>
AuthorDate: 2024-01-26 04:52:04 +0000
Commit:     Matt Turner <mattst88@gentoo.org>
CommitDate: 2024-01-26 04:52:33 +0000

    x11-base/xorg-server: Drop old versions
    
    Bug: https://bugs.gentoo.org/922395
    Signed-off-by: Matt Turner <mattst88@gentoo.org>

 x11-base/xorg-server/Manifest                      |   1 -
 x11-base/xorg-server/xorg-server-21.1.10-r1.ebuild | 194 ---------------------
 2 files changed, 195 deletions(-)
Comment 3 Larry the Git Cow gentoo-dev 2024-01-31 11:35:37 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/data/glsa.git/commit/?id=7b7fdd5a86cd28fc118fb133c98e81e2b15e0b92

commit 7b7fdd5a86cd28fc118fb133c98e81e2b15e0b92
Author:     GLSAMaker <glsamaker@gentoo.org>
AuthorDate: 2024-01-31 11:33:19 +0000
Commit:     Hans de Graaff <graaff@gentoo.org>
CommitDate: 2024-01-31 11:35:22 +0000

    [ GLSA 202401-30 ] X.Org X Server, XWayland: Multiple Vulnerabilities
    
    Bug: https://bugs.gentoo.org/916254
    Bug: https://bugs.gentoo.org/919803
    Bug: https://bugs.gentoo.org/922395
    Signed-off-by: GLSAMaker <glsamaker@gentoo.org>
    Signed-off-by: Hans de Graaff <graaff@gentoo.org>

 glsa-202401-30.xml | 64 ++++++++++++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 64 insertions(+)