{"id":"ALSA-2023:2805","summary":"Moderate: xorg-x11-server-Xwayland security update","details":"Xwayland is an X server for running X clients under Wayland.\n\nSecurity Fix(es):\n\n* xorg-x11-server: buffer overflow in _GetCountedString() in xkb/xkb.c (CVE-2022-3550)\n* xorg-x11-server: XkbGetKbdByName use-after-free (CVE-2022-4283)\n* xorg-x11-server: XTestSwapFakeInput stack overflow (CVE-2022-46340)\n* xorg-x11-server: XIPassiveUngrab out-of-bounds access (CVE-2022-46341)\n* xorg-x11-server: XvdiSelectVideoNotify use-after-free (CVE-2022-46342)\n* xorg-x11-server: ScreenSaverSetAttributes use-after-free (CVE-2022-46343)\n* xorg-x11-server: XIChangeProperty out-of-bounds access (CVE-2022-46344)\n* xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation (CVE-2023-0494)\n* xorg-x11-server: memory leak in ProcXkbGetKbdByName() in xkb/xkb.c (CVE-2022-3551)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.","modified":"2026-01-30T00:51:55.725116Z","published":"2023-05-16T00:00:00Z","related":["CVE-2022-3550","CVE-2022-3551","CVE-2022-4283","CVE-2022-46340","CVE-2022-46341","CVE-2022-46342","CVE-2022-46343","CVE-2022-46344","CVE-2023-0494"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:2805"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3550"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3551"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-4283"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-46340"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-46341"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-46342"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-46343"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-46344"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-0494"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2140698"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2140701"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2151755"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2151756"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2151757"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2151758"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2151760"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2151761"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2165995"},{"type":"ADVISORY","url":"https://errata.almalinux.org/8/ALSA-2023-2805.html"}],"affected":[{"package":{"name":"xorg-x11-server-Xwayland","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/xorg-x11-server-Xwayland"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"21.1.3-10.el8"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2023:2805.json"}}],"schema_version":"1.7.3"}