OESA-2024-1557

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-1557
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2024-1557.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2024-1557
Upstream
Published
2024-05-10T11:07:57Z
Modified
2025-08-12T05:40:34.063738Z
Summary
xorg-x11-server-xwayland security update
Details

Xwayland is an X server for running X clients under Wayland.

Security Fix(es):

A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.(CVE-2023-6478)

A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number of buttons, leading to a heap overflow if a bigger value was used.(CVE-2023-6816)

A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.(CVE-2024-0408)

A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.(CVE-2024-31080)

A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.(CVE-2024-31081)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:22.03-LTS-SP3 / xorg-x11-server-xwayland

Package

Name
xorg-x11-server-xwayland
Purl
pkg:rpm/openEuler/xorg-x11-server-xwayland&distro=openEuler-22.03-LTS-SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
xorg-x11-server-Xwayland-22.1.2-4.oe2203sp3

Ecosystem specific

{
    "aarch64": [
        "xorg-x11-server-Xwayland-debuginfo-22.1.2-4.oe2203sp3.aarch64.rpm",
        "xorg-x11-server-Xwayland-devel-22.1.2-4.oe2203sp3.aarch64.rpm",
        "xorg-x11-server-Xwayland-22.1.2-4.oe2203sp3.aarch64.rpm",
        "xorg-x11-server-Xwayland-debugsource-22.1.2-4.oe2203sp3.aarch64.rpm"
    ],
    "x86_64": [
        "xorg-x11-server-Xwayland-22.1.2-4.oe2203sp3.x86_64.rpm",
        "xorg-x11-server-Xwayland-debugsource-22.1.2-4.oe2203sp3.x86_64.rpm",
        "xorg-x11-server-Xwayland-debuginfo-22.1.2-4.oe2203sp3.x86_64.rpm",
        "xorg-x11-server-Xwayland-devel-22.1.2-4.oe2203sp3.x86_64.rpm"
    ],
    "src": [
        "xorg-x11-server-Xwayland-22.1.2-4.oe2203sp3.src.rpm"
    ]
}