CVE-2023-6377
🟡 Monitoruj
Błąd w xorg-server umożliwia eskalację uprawnień lub zdalne wykonanie kodu.
CVSS
7.8
EPSS
0.4%
Exploit
none
Vendor
redhat
Opis źródłowy (NVD)
A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote code execution in cases where X11 forwarding is involved.
privilege-escalation rce
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.8 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.4% |
| Opublikowano (NVD) | 2023-12-13 07:15:30 UTC |
| Ostatnia modyfikacja (NVD) | 2026-03-24 12:16:09 UTC |
Referencje
- https://access.redhat.com/errata/RHSA-2023:7886 (secalert@redhat.com) [Vendor Advisory]
- https://access.redhat.com/errata/RHSA-2024:0006 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2024:0009 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2024:0010 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2024:0014 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2024:0015 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2024:0016 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2024:0017 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2024:0018 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2024:0020 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2024:2169 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2024:2170 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2024:2995 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2024:2996 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2025:13998 (secalert@redhat.com)
- https://access.redhat.com/security/cve/CVE-2023-6377 (secalert@redhat.com) [Vendor Advisory]
- https://bugzilla.redhat.com/show_bug.cgi?id=2253291 (secalert@redhat.com) [Issue Tracking]
- https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd (secalert@redhat.com) [Patch]
- https://lists.x.org/archives/xorg-announce/2023-December/003435.html (secalert@redhat.com) [Mailing List]
- http://www.openwall.com/lists/oss-security/2023/12/13/1 (af854a3a-2127-422b-91ae-364da2661108)
- https://lists.debian.org/debian-lts-announce/2023/12/msg00008.html (af854a3a-2127-422b-91ae-364da2661108)
- https://lists.debian.org/debian-lts-announce/2023/12/msg00013.html (af854a3a-2127-422b-91ae-364da2661108)
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6R63Z6GIWM3YUNZRCGFODUXLW3GY2HD6/ (af854a3a-2127-422b-91ae-364da2661108)
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7PP47YXKM5ETLCYEF6473R3VFCJ6QT2S/ (af854a3a-2127-422b-91ae-364da2661108)
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFHV5KCQ2SVOD4QMCPZ5HC6YL44L7YJD/ (af854a3a-2127-422b-91ae-364da2661108)
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LJDFWDB7EQVZA45XDP7L5WRSRWS6RVRR/ (af854a3a-2127-422b-91ae-364da2661108)
- https://security.gentoo.org/glsa/202401-30 (af854a3a-2127-422b-91ae-364da2661108)
- https://security.netapp.com/advisory/ntap-20240125-0003/ (af854a3a-2127-422b-91ae-364da2661108)
- https://www.debian.org/security/2023/dsa-5576 (af854a3a-2127-422b-91ae-364da2661108)