CVE-2023-6816
🟠 Łataj w tym tygodniu
Przepełnienie bufora w serwerze X.Org może prowadzić do zdalnego wykonania kodu, zagrażając bezpieczeństwu systemu.
CVSS
9.8
EPSS
3.3%
Exploit
none
Vendor
redhat
Opis źródłowy (NVD)
A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number of buttons, leading to a heap overflow if a bigger value was used.
buffer-overflow
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.8 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 3.3% |
| Opublikowano (NVD) | 2024-01-18 05:15:08 UTC |
| Ostatnia modyfikacja (NVD) | 2026-03-19 22:16:15 UTC |
Referencje
- https://access.redhat.com/errata/RHSA-2024:0320 (secalert@redhat.com) [Third Party Advisory]
- https://access.redhat.com/errata/RHSA-2024:0557 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2024:0558 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2024:0597 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2024:0607 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2024:0614 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2024:0617 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2024:0621 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2024:0626 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2024:0629 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2024:2169 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2024:2170 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2024:2995 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2024:2996 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2025:12751 (secalert@redhat.com)
- https://access.redhat.com/security/cve/CVE-2023-6816 (secalert@redhat.com) [Third Party Advisory]
- https://bugzilla.redhat.com/show_bug.cgi?id=2257691 (secalert@redhat.com) [Issue Tracking]
- http://www.openwall.com/lists/oss-security/2024/01/18/1 (af854a3a-2127-422b-91ae-364da2661108)
- https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html (af854a3a-2127-422b-91ae-364da2661108)
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/ (af854a3a-2127-422b-91ae-364da2661108)
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/ (af854a3a-2127-422b-91ae-364da2661108)
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/ (af854a3a-2127-422b-91ae-364da2661108)
- https://security.gentoo.org/glsa/202401-30 (af854a3a-2127-422b-91ae-364da2661108)
- https://security.netapp.com/advisory/ntap-20240307-0006/ (af854a3a-2127-422b-91ae-364da2661108)