[ALSA-2024:2170] Moderate: xorg-x11-server-Xwayland security update
Type:
security
Severity:
moderate
Release date:
2024-05-07
Description:
Xwayland is an X server for running X clients under Wayland. Security Fix(es): * xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367) * xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377) * xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478) * xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816) * xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229) * xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408) * xorg-x11-server: SELinux context corruption (CVE-2024-0409) * xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885) * xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 xorg-x11-server-Xwayland-22.1.9-5.el9.aarch64.rpm fe115eb9cdb5d8b04fe1117ca7e4aab1dabf86055a5474d1073da816b038eda0
ppc64le xorg-x11-server-Xwayland-22.1.9-5.el9.ppc64le.rpm bdd461475029c61b08e5cbee8a2724c8c8ad2c42fdff39d3f7e5ad1e8c2415b5
s390x xorg-x11-server-Xwayland-22.1.9-5.el9.s390x.rpm 878b2ae2c9bf8877511b8dc4afc3d985c8b708d23649ffaca0065a6e1e49ee49
x86_64 xorg-x11-server-Xwayland-22.1.9-5.el9.x86_64.rpm 59d6fc3c05b4ce227c70e4bbc5bd172b8203042adeaa3e537a2c5450bd226605
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.