{"id":"CVE-2023-6478","summary":"Xorg-x11-server: out-of-bounds memory read in rrchangeoutputproperty and rrchangeproviderproperty","details":"A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.","modified":"2026-05-09T03:33:46.720805Z","published":"2023-12-13T06:27:41.017Z","related":["ALSA-2024:0010","ALSA-2024:0018","ALSA-2024:2169","ALSA-2024:2170","ALSA-2024:2995","ALSA-2024:2996","SUSE-SU-2023:4787-1","SUSE-SU-2023:4788-1","SUSE-SU-2023:4789-1","SUSE-SU-2023:4790-1","SUSE-SU-2023:4791-1","SUSE-SU-2023:4792-1","openSUSE-SU-2024:13512-1","openSUSE-SU-2024:13513-1"],"database_specific":{"cwe_ids":["CWE-190"],"cna_assigner":"redhat","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/6xxx/CVE-2023-6478.json"},"references":[{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2023/12/13/1"},{"type":"WEB","url":"https://access.redhat.com/downloads/content/package-browser/"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00008.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6R63Z6GIWM3YUNZRCGFODUXLW3GY2HD6/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7PP47YXKM5ETLCYEF6473R3VFCJ6QT2S/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFHV5KCQ2SVOD4QMCPZ5HC6YL44L7YJD/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LJDFWDB7EQVZA45XDP7L5WRSRWS6RVRR/"},{"type":"WEB","url":"https://lists.x.org/archives/xorg-announce/2023-December/003435.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:7886"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0006"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0009"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0010"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0014"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0015"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0016"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0017"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0018"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0020"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:2169"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:2170"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:2995"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:2996"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:12751"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2023-6478"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/6xxx/CVE-2023-6478.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6478"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202401-30"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20240125-0003/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5576"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253298"},{"type":"FIX","url":"https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.freedesktop.org/xorg/xserver","events":[{"introduced":"0"},{"fixed":"15e2409776014b41c77f7da7aeb9520613994d27"},{"fixed":"7439e9c6c59219335fe35629a90f4fdd49912bcf"},{"fixed":"14f480010a93ff962fef66a16412fafff81ad632"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"fixed":"21.1.10"},{"fixed":"23.2.3"}],"source":["CPE_FIELD","REFERENCES"],"cpe":["cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*","cpe:2.3:a:x.org:xwayland:*:*:*:*:*:*:*:*"]}}],"versions":["DRI-XFree86-4_3_99_12-merge","DRI-trunk-20040613","DRI-trunk-20040721","DRM-1_0_5","DRM-20040613","DRM-20040721","DRM-20050615","DRM-20051017","DRM-2_0_0","Domain-base","Domain-sync1","Domain-sync2","Domain-sync3","Domain-sync4","MODULAR_COPY","PRE_xf86-4_3_0_1","XACE-SELINUX-MERGE","XORG-6_7_99_1","XORG-6_7_99_2","XORG-6_7_99_901","XORG-6_7_99_902","XORG-6_7_99_903","XORG-6_7_99_904","XORG-6_8_0","XORG-6_8_99_1","XORG-6_8_99_10","XORG-6_8_99_11","XORG-6_8_99_12","XORG-6_8_99_13","XORG-6_8_99_14","XORG-6_8_99_15","XORG-6_8_99_16","XORG-6_8_99_2","XORG-6_8_99_3","XORG-6_8_99_4","XORG-6_8_99_5","XORG-6_8_99_6","XORG-6_8_99_7","XORG-6_8_99_8","XORG-6_8_99_9","XORG-6_8_99_900","XORG-6_8_99_901","XORG-6_8_99_902","XORG-6_8_99_903","XORG-6_99_99_900","XORG-6_99_99_901","XORG-6_99_99_902","XORG-6_99_99_903","XORG-6_99_99_904","XORG-7_0","XORG-7_0_99_901","XORG-MAIN","add-Xi","ah-20021030","ah-20021030-postdri","before-mesa-4_0-import","dhd-20010328","dhd-20010817","dhd-20020916","dri-0-1-branchpoint","dri-20020129-merge","dri-20020222-merge","kdrive-initial-import","keithp","lg3d-base","pre-R651-import","pre-xgldrop-merge","sco_port_update-base","xf-3_9_16Z","xf-3_9_16Za","xf-3_9_16d","xf-3_9_16e","xf-3_9_16f","xf-3_9_17","xf-3_9_17Z","xf-3_9_17a","xf-3_9_17b","xf-3_9_17c","xf-3_9_17d","xf-3_9_17e","xf-3_9_17f","xf-3_9_18","xf-3_9_18Z","xf-3_9_18Za","xf-3_9_18a","xf-3_9_18b","xf-4_0","xf-4_0-bindist","xf-4_0Z","xf-4_0_1","xf-4_0_1-bindist","xf-4_0_1Z","xf-4_0_1Za","xf-4_0_1Zb","xf-4_0_1Zc","xf-4_0_1a","xf-4_0_1b","xf-4_0_1c","xf-4_0_1d","xf-4_0_1e","xf-4_0_1f","xf-4_0_1g","xf-4_0_1h","xf-4_0_2","xf-4_0_2-bindist","xf-4_0_99_1","xf-4_0_99_2","xf-4_0_99_3","xf-4_0_99_900","xf-4_0a","xf-4_0b","xf-4_0c","xf-4_0d","xf-4_0e","xf-4_0f","xf-4_0g","xf-4_1_99_1","xf-4_1_99_2","xf-4_1_99_3","xf-4_1_99_4","xf-4_1_99_5","xf-4_1_99_6","xf-4_1_99_7","xf-4_2-bp","xf-4_2_0","xf-4_2_0-bindist","xf-4_2_0-bindist-1","xf-4_2_0_1","xf-4_2_1","xf-4_2_1_1","xf-4_2_99_1","xf-4_2_99_2","xf-4_2_99_3","xf-4_2_99_4","xf-4_2_99_901","xf-4_2_99_902","xf-4_3_0","xf-4_3_0_1","xf-4_3_99_1","xf-4_3_99_2","xf-4_3_99_3","xf-4_3_99_4","xf-4_3_99_5","xf-4_3_99_6","xf86-012804-2330","xf86-4_3_0_1","xf86-4_3_99_16","xf86-4_3_99_901","xf86-4_3_99_902","xf86-4_3_99_903","xf86-4_3_99_903_special","xf86-4_4_0","xf86-4_4_99_1","xfixes_2_branchpoint","xorg-server-0_99_1","xorg-server-1.1.99.3","xorg-server-1.10.0","xorg-server-1.10.99.901","xorg-server-1.10.99.902","xorg-server-1.11.0","xorg-server-1.11.99.1","xorg-server-1.11.99.901","xorg-server-1.11.99.902","xorg-server-1.11.99.903","xorg-server-1.12.0","xorg-server-1.12.99.901","xorg-server-1.12.99.902","xorg-server-1.12.99.903","xorg-server-1.12.99.904","xorg-server-1.12.99.905","xorg-server-1.13.0","xorg-server-1.13.99.901","xorg-server-1.13.99.902","xorg-server-1.14.0","xorg-server-1.14.99.1","xorg-server-1.14.99.2","xorg-server-1.14.99.3","xorg-server-1.14.99.901","xorg-server-1.14.99.902","xorg-server-1.14.99.903","xorg-server-1.14.99.904","xorg-server-1.14.99.905","xorg-server-1.15.0","xorg-server-1.15.99.901","xorg-server-1.15.99.902","xorg-server-1.15.99.903","xorg-server-1.15.99.904","xorg-server-1.16.0","xorg-server-1.16.99.901","xorg-server-1.16.99.902","xorg-server-1.17.0","xorg-server-1.17.99.901","xorg-server-1.17.99.902","xorg-server-1.18.0","xorg-server-1.18.99.2","xorg-server-1.18.99.901","xorg-server-1.18.99.902","xorg-server-1.19.0","xorg-server-1.19.99.901","xorg-server-1.19.99.902","xorg-server-1.19.99.903","xorg-server-1.19.99.904","xorg-server-1.19.99.905","xorg-server-1.20.0","xorg-server-1.5.99.1","xorg-server-1.6.99.900","xorg-server-1.6.99.901","xorg-server-1.7.99.1","xorg-server-1.7.99.2","xorg-server-1.7.99.901","xorg-server-1.7.99.902","xorg-server-1.8.0","xorg-server-1.8.99.901","xorg-server-1.8.99.902","xorg-server-1.8.99.903","xorg-server-1.8.99.904","xorg-server-1.8.99.905","xorg-server-1.8.99.906","xorg-server-1.9.0","xorg-server-1.9.99.901","xorg-server-1.9.99.902","xorg-server-1.9.99.903","xorg-server-1_0_99_1","xorg-server-1_0_99_2","xorg-server-1_0_99_901","xorg-server-1_1_99_1","xorg-server-1_1_99_2","xorg-server-21.0.99.1","xorg-server-21.0.99.901","xorg-server-21.0.99.902","xorg-server-21.1.0","xorg-server-21.1.1","xorg-server-21.1.2","xorg-server-21.1.3","xorg-server-21.1.4","xorg-server-21.1.5","xorg-server-21.1.6","xorg-server-21.1.7","xorg-server-21.1.8","xorg-server-21.1.9","xwayland-23.1.99.901","xwayland-23.1.99.902","xwayland-23.2.0","xwayland-23.2.1","xwayland-23.2.2"],"database_specific":{"vanir_signatures":[{"source":"https://gitlab.freedesktop.org/xorg/xserver@14f480010a93ff962fef66a16412fafff81ad632","deprecated":false,"target":{"file":"randr/rrproperty.c"},"id":"CVE-2023-6478-58fda048","signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["200756410113107532464116263241543496755","159544367717622752330049412082583520851","34752593602938598555778189773410832668","130121146301272206283198864372898575079"]},"signature_version":"v1"},{"source":"https://gitlab.freedesktop.org/xorg/xserver@14f480010a93ff962fef66a16412fafff81ad632","deprecated":false,"target":{"file":"randr/rrproviderproperty.c"},"id":"CVE-2023-6478-642a392c","signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["200756410113107532464116263241543496755","159544367717622752330049412082583520851","18962900824281389668529133635982324986","144981788402403718693218915965340486412"]},"signature_version":"v1"}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-6478.json","vanir_signatures_modified":"2026-05-09T03:33:46Z"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L"}]}