xorg-x11-server-1.20.11-22.el8

エラータID: AXSA:2024-8304:07

Release date: 
Monday, June 17, 2024 - 18:00
Subject: 
xorg-x11-server-1.20.11-22.el8
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
Moderate
Description: 

X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.

Security Fix(es):

* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)
* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)
* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)
* xorg-x11-server: SELinux context corruption (CVE-2024-0409)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
* xorg-x11-server: Use-after-free bug in DestroyWindow (CVE-2023-5380)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Asianux Server 8.10 Release Notes linked from the References section.

CVE-2023-5367
A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.
CVE-2023-5380
A use-after-free flaw was found in the xorg-x11-server. An X server crash may occur in a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode) if the pointer is warped from within a window on one screen to the root window of the other screen and if the original window is destroyed followed by another window being destroyed.
CVE-2023-6377
A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote code execution in cases where X11 forwarding is involved.
CVE-2023-6478
A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.
CVE-2024-0229
An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.
CVE-2024-0408
A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.
CVE-2024-0409
A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.
CVE-2024-21885
A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.
CVE-2024-21886
A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. xorg-x11-server-1.20.11-22.el8.src.rpm
    MD5: f39af44daa636deb978a0d5234178c97
    SHA-256: 7fe9db5e436d5c49b576c2965c447f14a4e8b38211cf31eec5ace21e110987cc
    Size: 6.27 MB

Asianux Server 8 for x86_64
  1. xorg-x11-server-common-1.20.11-22.el8.x86_64.rpm
    MD5: 42ede23680494d347f3a6de404e7877c
    SHA-256: f044a6ef9d87428e2d5914896b58795b2dee4a889be243afeb459c0150527b03
    Size: 43.94 kB
  2. xorg-x11-server-devel-1.20.11-22.el8.i686.rpm
    MD5: c645b35b5b1d28e1c8d00b7e84261a28
    SHA-256: 9b439516f7b9724c74f55e5a6e51b81715ad5f70ddd45d51e964d6335eb85562
    Size: 247.96 kB
  3. xorg-x11-server-devel-1.20.11-22.el8.x86_64.rpm
    MD5: b64c3341450dc0a53b81dd2a5e10f2b6
    SHA-256: 2de04e8b5219f403484a126ae93fdbb0d33a2f7339e3c9c484545e6d4e5b833e
    Size: 247.93 kB
  4. xorg-x11-server-source-1.20.11-22.el8.noarch.rpm
    MD5: 69cf43b4c6656eca03eb0a7f7ca75aa3
    SHA-256: 33ecd2ae694134986b1a4fdba687d2b8a0bb550f46ae07a7318fbd9c408c1158
    Size: 2.43 MB
  5. xorg-x11-server-Xdmx-1.20.11-22.el8.x86_64.rpm
    MD5: 18c1584bab48485b1e252930be914be6
    SHA-256: dccacf89b824348085fc38eac69e9c4242fc77ba07893619d8cbf540d1c75369
    Size: 903.94 kB
  6. xorg-x11-server-Xephyr-1.20.11-22.el8.x86_64.rpm
    MD5: 98106c172703dfcd2dcb0ad7ab3649ff
    SHA-256: 6eb564ea8e15eec71f626f71c6bc13695e34e399cc6b9c60016caf984f4b4da5
    Size: 1.00 MB
  7. xorg-x11-server-Xnest-1.20.11-22.el8.x86_64.rpm
    MD5: 84d14b2e65425f8dbb1c674a011c5f8c
    SHA-256: 3035012510baca20978e57d62ccb595c8432fa3eab6455df07efbac2edba5547
    Size: 720.22 kB
  8. xorg-x11-server-Xorg-1.20.11-22.el8.x86_64.rpm
    MD5: a0d464b5976abb6e2e2aba83ea11a7ec
    SHA-256: c7a966a664b430f982b749956d14a59b2a45fb8a795023b9fc5e6ea9170e74ce
    Size: 1.49 MB
  9. xorg-x11-server-Xvfb-1.20.11-22.el8.x86_64.rpm
    MD5: 114d591d1d4d648acc8c9baf4ae6f156
    SHA-256: 48290c42a09b8f64345154de7da073aadfb1a294fb5caf5ba636f9633b94db8d
    Size: 873.30 kB