{"id":"ALSA-2024:2170","summary":"Moderate: xorg-x11-server-Xwayland security update","details":"Xwayland is an X server for running X clients under Wayland.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)\n* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)\n* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)\n* xorg-x11-server: SELinux context corruption (CVE-2024-0409)\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.","modified":"2026-01-30T02:45:18.843184Z","published":"2024-04-30T00:00:00Z","related":["CVE-2023-5367","CVE-2023-6377","CVE-2023-6478","CVE-2023-6816","CVE-2024-0229","CVE-2024-0408","CVE-2024-0409","CVE-2024-21885","CVE-2024-21886"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:2170"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-5367"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6377"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6478"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-6816"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-0229"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-0408"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-0409"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-21885"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-21886"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2243091"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2253291"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2253298"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2256540"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2256542"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2256690"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2257689"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2257690"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2257691"},{"type":"ADVISORY","url":"https://errata.almalinux.org/9/ALSA-2024-2170.html"}],"affected":[{"package":{"name":"xorg-x11-server-Xwayland","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/xorg-x11-server-Xwayland"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"22.1.9-5.el9"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2024:2170.json"}}],"schema_version":"1.7.3"}