<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<atom:link href="https://dev1galaxy.org/extern.php?action=feed&amp;tid=6236&amp;type=rss" rel="self" type="application/rss+xml" />
		<title><![CDATA[Dev1 Galaxy Forum / X.Org Security Advisory: Issues in X.Org X server]]></title>
		<link>https://dev1galaxy.org/viewtopic.php?id=6236</link>
		<description><![CDATA[The most recent posts in X.Org Security Advisory: Issues in X.Org X server.]]></description>
		<lastBuildDate>Wed, 13 Dec 2023 05:32:38 +0000</lastBuildDate>
		<generator>FluxBB</generator>
		<item>
			<title><![CDATA[X.Org Security Advisory: Issues in X.Org X server]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=46167#p46167</link>
			<description><![CDATA[<p>Hello:</p><p>Just got this in my inbox.<br />Good to see that things &#039;X11&#039; are rolling along steadily.</p><p>Best,</p><p>A.</p><p>========================================================================<br />X.Org Security Advisory: December 13, 2023</p><p>Issues in X.Org X server prior to 21.1.10 and Xwayland prior to 23.2.3<br />========================================================================</p><p>Multiple issues have been found in the X server and Xwayland implementations <br />published by X.Org for which we are releasing security fixes for in<br />xorg-server-21.1.10 and xwayland-23.2.3.</p><p>1) CVE-2023-6377 can be triggered by forcing a logical device change on a device<br />with buttons which will result in an out-of-bounds memory write.</p><p>2) CVE-2023-6478 can be triggered by sending a specially crafted<br />request RRChangeProviderProperty or RRChangeOutputProperty. This will trigger<br />an integer overflow and lead to disclosure of information.</p><p>------------------------------------------------------------------------------------------------------------------------------</p><p>1) CVE-2023-6377: X.Org server: Out-of-bounds memory write in XKB button actions</p><p>Introduced in: xorg-server-1.6.0 (2009)<br />Fixed in: xorg-server-21.1.10 and xwayland-23.2.3<br />Fix: <a href="https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd" rel="nofollow">https://gitlab.freedesktop.org/xorg/xse … 4f93810afd</a><br />Found by: Jan-Niklas Sohn working with Trend Micro Zero Day Initiative</p><p>A device has XKB button actions for each button on the device. When a logical<br />device switch happens (e.g. moving from a touchpad to a mouse), the server <br />re-calculates the information available on the respective master device<br />(typically the Virtual Core Pointer). This re-calculation only allocated enough<br />memory for a single XKB action rather instead of enough for the newly active<br />physical device&#039;s number of button. As a result, querying or changing the XKB<br />button actions results in out-of-bounds memory reads and writes.</p><p>This may lead to local privilege escalation if the server is run as root or<br />remote code execution (e.g. x11 over ssh).</p><p>xorg-server-21.1.10 and xwayland-23.2.3 have been patched to fix this issue.</p><p>2) CVE-2023-6478: X.Org server: Out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty</p><p>Introduced in: xorg-server-1.4.0 (2007) and xorg-server-1.13.0 (2012), respectively<br />Fixed in: xorg-server-21.1.10 and xwayland-23.2.3<br />Fix: <a href="https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632" rel="nofollow">https://gitlab.freedesktop.org/xorg/xse … fff81ad632</a><br />Found by: Jan-Niklas Sohn working with Trend Micro Zero Day Initiative</p><p>This fixes an OOB read and the resulting information disclosure.</p><p>Length calculation for the request was clipped to a 32-bit integer. With<br />the correct stuff-&gt;nUnits value the expected request size was<br />truncated, passing the REQUEST_FIXED_SIZE check.</p><p>The server then proceeded with reading at least stuff-&gt;nUnits bytes<br />(depending on stuff-&gt;format) from the request and stuffing whatever it<br />finds into the property. In the process it would also allocate at least<br />stuff-&gt;nUnits bytes, i.e. 4GB.</p><p>See also CVE-2022-46344 where this issue was fixed for other requests.</p><p>xorg-server-21.1.10 and xwayland-23.2.3 have been patched to fix this issue.</p><p>------------------------------------------------------------------------------------------------------------------------------</p>]]></description>
			<author><![CDATA[dummy@example.com (Altoid)]]></author>
			<pubDate>Wed, 13 Dec 2023 05:32:38 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=46167#p46167</guid>
		</item>
	</channel>
</rss>
