summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorGLSAMaker <glsamaker@gentoo.org>2024-01-31 11:33:19 +0000
committerHans de Graaff <graaff@gentoo.org>2024-01-31 12:35:22 +0100
commit7b7fdd5a86cd28fc118fb133c98e81e2b15e0b92 (patch)
tree9fdcf87f8bf7066856fc2412e4d7b589f0e8644b
parent[ GLSA 202401-29 ] sudo: Memory Manipulation (diff)
downloadglsa-7b7fdd5a86cd28fc118fb133c98e81e2b15e0b92.tar.gz
glsa-7b7fdd5a86cd28fc118fb133c98e81e2b15e0b92.tar.bz2
glsa-7b7fdd5a86cd28fc118fb133c98e81e2b15e0b92.zip
[ GLSA 202401-30 ] X.Org X Server, XWayland: Multiple Vulnerabilities
Bug: https://bugs.gentoo.org/916254 Bug: https://bugs.gentoo.org/919803 Bug: https://bugs.gentoo.org/922395 Signed-off-by: GLSAMaker <glsamaker@gentoo.org> Signed-off-by: Hans de Graaff <graaff@gentoo.org>
-rw-r--r--glsa-202401-30.xml64
1 files changed, 64 insertions, 0 deletions
diff --git a/glsa-202401-30.xml b/glsa-202401-30.xml
new file mode 100644
index 00000000..527cd4cf
--- /dev/null
+++ b/glsa-202401-30.xml
@@ -0,0 +1,64 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202401-30">
+ <title>X.Org X Server, XWayland: Multiple Vulnerabilities</title>
+ <synopsis>Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution.</synopsis>
+ <product type="ebuild">xorg-server,xwayland</product>
+ <announced>2024-01-31</announced>
+ <revised count="1">2024-01-31</revised>
+ <bug>916254</bug>
+ <bug>919803</bug>
+ <bug>922395</bug>
+ <access>remote</access>
+ <affected>
+ <package name="x11-base/xorg-server" auto="yes" arch="*">
+ <unaffected range="ge">21.1.11</unaffected>
+ <vulnerable range="lt">21.1.11</vulnerable>
+ </package>
+ <package name="x11-base/xwayland" auto="yes" arch="*">
+ <unaffected range="ge">23.2.4</unaffected>
+ <vulnerable range="lt">23.2.4</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>The X Window System is a graphical windowing system based on a client/server model.</p>
+ </background>
+ <description>
+ <p>Multiple vulnerabilities have been discovered in X.Org X Server and XWayland. Please review the CVE identifiers referenced below for details.</p>
+ </description>
+ <impact type="normal">
+ <p>The X server can be crashed by a malicious client, or potentially be compromised for remote code execution in environments with X11 forwarding.</p>
+ </impact>
+ <workaround>
+ <p>Users can ensure no untrusted clients can access the running X implementation.</p>
+ </workaround>
+ <resolution>
+ <p>All X.Org X Server users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=x11-base/xorg-server-21.1.11"
+ </code>
+
+ <p>All XWayland users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=x11-base/xwayland-23.2.4"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5367">CVE-2023-5367</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-5380">CVE-2023-5380</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-6377">CVE-2023-6377</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-6478">CVE-2023-6478</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-6816">CVE-2023-6816</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-0229">CVE-2024-0229</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-0408">CVE-2024-0408</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-0409">CVE-2024-0409</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-21885">CVE-2024-21885</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-21886">CVE-2024-21886</uri>
+ </references>
+ <metadata tag="requester" timestamp="2024-01-31T11:33:19.783411Z">ajak</metadata>
+ <metadata tag="submitter" timestamp="2024-01-31T11:33:19.787307Z">graaff</metadata>
+</glsa> \ No newline at end of file